Security Bulletin
22 Feb 2024
Biztonsági szemle
Attackers target Confluence flaws with SSH-Snake pentesting tool
The fileless, self-modifying, worm-like network traversal tool automatically searches for SSH keys.
22 Feb 2024
Biztonsági szemle
US sounds cybersecurity alarm over water systems in latest wave of China-linked warnings
The past few weeks have indicated that the US has shifted and will continue a more offensive cyberwarfare approach in the coming months.
22 Feb 2024
Biztonsági szemle
Zero-Click Apple Shortcuts Vulnerability Allows Silent Data Theft
Vulnerability CVE-2024-23204, affecting Apple's popular Shortcuts app, suggests a critical need for ongoing security awareness in the macOS and iOS ecosystem.
22 Feb 2024
Biztonsági szemle
Russian Cyberattackers Launch Multiphase PsyOps Campaign
Operation Texonto spanned several months, using various Russian propaganda lures and spear-phishing to misinform and trick users into giving up Microsoft 365 credentials.
22 Feb 2024
Biztonsági szemle
Identify Weak Links in Your Application Stack – Part 2, Anomaly Detection
How can you learn what’s normal, and flag when abnormal behavior of an application is detected? This blog gets you started with how to configure anomaly detection and associate actions when violations are detected.
22 Feb 2024
Biztonsági szemle
Webex Connect’s Second Quarter
Checking in on Webex Connect’s second quarter at the Cisco Store.
22 Feb 2024
Biztonsági szemle
Coming Soon to Wi-SUN Field Area Network: Versatility to connect sensors with low power and high throughput capabilities
The Catalyst IR8140 Heavy Duty Series Router will be Cisco’s first router to support new Capabilities for FAN 1.1. to meet increasing digitization needs.
22 Feb 2024
Biztonsági szemle
Industries most targeted by active adversaries
Manufacturing consistently trends among the most heavily targeted by active adversaries.
22 Feb 2024
Biztonsági szemle
Identify Weak Links in Your Application Stack – Part 1, Health Rules
See how Cisco Cloud Observability helps you tightly integrate with your cloud providers to collect data that can then be used to correlate and contextualize to achieve real-time observability across their entire technology stack.
22 Feb 2024
Biztonsági szemle
Automating Observability of Public Cloud Deployments with Cisco Cloud Observability APIs
Automations for setting up observability across various cloud vendors – with a single set of APIs - will allow enterprises to focus on their mission critical business applications and user experience rather than dealing with the proprietary...
22 Feb 2024
Biztonsági szemle
Securing the power grid: Are you ready for NERC CIP’s upcoming mandate?
NERC has proposed a set of new cybersecurity requirements to ensure there is no gap in how power utilities secure their grid operations. Learn what they are and how Cisco can help you implement these new capabilities to drive compliance.
22 Feb 2024
Biztonsági szemle
How active adversaries adapt their attack techniques
Active adversaries will do whatever it takes to infiltrate their target.
Pagination
- Previous page ‹‹
- Page 984
- Next page ››