Security Bulletin
20 Nov 2023
Biztonsági szemle
What Healthcare Cybersecurity Leaders Should Know About the FDA's Section 524B Guidelines
New cybersecurity regulations from the FDA outline specific steps that medical device companies must take in order to get their devices approved for market.
20 Nov 2023
Biztonsági szemle
GenAI Requires New, Intelligent Defenses
Understanding the risks of generative AI and the specific defenses to build to mitigate those risks is vital for effective business and public use of GenAI.
20 Nov 2023
Biztonsági szemle
Major Saudi University to Offer AI, Cybersecurity Studies
University of Jeddah partners with Resecurity to teach cybersecurity skills.
20 Nov 2023
Biztonsági szemle
Amid Military Buildup, China Deploys Mustang Panda in the Philippines
China pairs cyber and kinetic attacks in the South Pacific as it continues to wrangle control of the South China Sea.
20 Nov 2023
Biztonsági szemle
Amid Military Buildup, China Deploys Mustang Panda in the Philippines
China pairs cyber and kinetic attacks in the South Pacific as it continues to wrangle control of the South China Sea.
20 Nov 2023
Biztonsági szemle
Cisco Live is the time to jump into the future. Together.
Cisco Live Melbourne is right around the corner. I couldn’t be more excited to spend time with Cisco customers and partners at this energizing event December 5-8, 2023.
20 Nov 2023
Biztonsági szemle
Cisco Transportation at Smart City Expo World Congress (SCEWC) 2023
Cisco recently attended Smart City Expo World Congress in Barcelona, Spain where 25,000 attendees from 800 cities came together with a common purpose to moving cities towards a better future. Cisco’s belief that that technology holds the promise of...
20 Nov 2023
Biztonsági szemle
CISA Launches Pilot Program to Address Critical Infrastructure Threats
CISA expects to extend this program to include up to 100 critical infrastructure entities in its first year.
20 Nov 2023
Biztonsági szemle
Same threats, different ransomware
A threat cluster's switch from Vice Society to Rhysida.
20 Nov 2023
Biztonsági szemle
LummaC2 4.0 infostealer uses trigonometry to avoid sandboxes
Outpost24 researchers expect LummaC2 4.0 malware to evolve with improved obfuscation techniques and updates to its control panel.
20 Nov 2023
Biztonsági szemle
Exploited Vulnerabilities Can Take Months to Make KEV List
The Known Exploited Vulnerabilities (KEV) catalog is a high-quality source of information on software flaws being exploited in the wild, but updates are often delayed, so companies need other sources of threat intelligence.
20 Nov 2023
Biztonsági szemle
Enterprise Generative AI Enters Its Citizen Development Era
Your business users are building Copilots and GPTs with your enterprise data. What can you do about it?
Pagination
- Previous page ‹‹
- Page 1235
- Next page ››