Security Bulletin
23 Jan 2026
Biztonsági szemle
Using Kea Config File Includes
Introduction Kea features an extension to JSON that allows one to include the contents of one file into another file: The directive. This feature can be used to simplify management of Kea configurations. This article provides practical examples of...
23 Jan 2026
Biztonsági szemle
Sajtószemle – 2026. 4. hét
Megjelent a 2026. 4. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2026.01.16. és 2026.01.22. között kezelt incidensek, valamint az elosztott kormányzati IT biztonsági csapdarendszerből (GovProbe1) származó adatok statisztikai eloszlását is...
23 Jan 2026
Biztonsági szemle
ISC Stormcast For Friday, January 23rd, 2026 https://isc.sans.edu/podcastdetail/9778, (Fri, Jan 23rd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
22 Jan 2026
Biztonsági szemle
Risky Chinese Electric Buses Spark Aussie Gov't Review
Deployed across Australia and Europe, China's electric buses are vulnerable to cybercriminals and sport a virtual kill switch the Chinese state could activate.
22 Jan 2026
Biztonsági szemle
Fortinet Firewalls Hit With Malicious Configuration Changes
Automated infections of potentially fully patched FortiGate devices are allowing threat actors to steal firewall configuration files.
22 Jan 2026
Biztonsági szemle
From a Whisper to a Scream: Europe Frets About Overreliance on US Tech
Concern is growing across Europe about relying on US cybersecurity companies, and Greenland takeover talk is eroding trust across the EU even further.
22 Jan 2026
Biztonsági szemle
Latin American Orgs Lack Confidence in Cyber Defenses, Skills
Cybersecurity professionals in Latin America are least likely to have faith in their countries' preparedness for cyberattacks on critical infrastructure, the World Economic Forum says.
22 Jan 2026
Biztonsági szemle
DPRK Actors Deploy VS Code Tunnels for Remote Hacking
A spear-phishing campaign tied to the Democratic People's Republic of Korea (DPRK) uses trusted Microsoft infrastructure to avoid detection.
22 Jan 2026
Biztonsági szemle
Introducing Intent-Based Policy Management for Cisco Hybrid Mesh Firewall
Hybrid Mesh Firewall introduces intent-based policy management across multi-vendor firewalls through Cisco Security Cloud Control with Mesh Policy Engine.
22 Jan 2026
Biztonsági szemle
Is AI-Generated Code Secure?, (Thu, Jan 22nd)
The title of this diary is perhaps a bit catchy but the question is important. I don't consider myself as a good developer. That's not my day job and I'm writing code to improve my daily tasks. I like to say âI'm writing sh*ty code...
22 Jan 2026
Biztonsági szemle
ISC Stormcast For Thursday, January 22nd, 2026 https://isc.sans.edu/podcastdetail/9776, (Thu, Jan 22nd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
22 Jan 2026
Biztonsági szemle
Dark Reading Confidential: Reviving the Hacker Ethos That Built Cybersecurity
Dark Reading Confidential Episode 14: How curious, ethical problem-solving can continue to serve as a guiding principle for an evolving cybersecurity sector.
Pagination
- Previous page ‹‹
- Page 15
- Next page ››