Security Bulletin
11 Mar 2026
Biztonsági szemle
Xygeni GitHub Action Compromised Via Tag Poison
Attackers operated an active C2 implant for up to a week and compromised AppSec vendor Xygeni's xygeni/xygeni-action in that time.
11 Mar 2026
Biztonsági szemle
Cisco LiveProtect: Bringing eBPF-Powered Protection into Network Infrastructure
Discover how MaxLiveProtect uses eBPF-powered technology to deliver real-time, in-kernel security for modern network infrastructure devices.
11 Mar 2026
Biztonsági szemle
Accelerating AI and Data Center Innovation with Cisco Refresh
As organizations race to deploy AI at scale, infrastructure is quickly becoming the limiting factor. Delays in securing key hardware can disrupt deployment timelines and drive significant cost overruns. This moment feels different for infrastructure...
11 Mar 2026
Biztonsági szemle
Circular design illustrated through four products
At Cisco, Circular Design means building sustainability into our products and packaging from the start.
11 Mar 2026
Biztonsági szemle
Running Event Wi-Fi at Cisco Partner Summit With Client-Side Insight From Wyebot
Discover how Cisco used Wyebot sensors at Partner Summit 2025 to gain client-side visibility, manage naval radar interference, and ensure seamless Wi-Fi for keynotes and live demos. Learn why proactive monitoring is the key to managing high-pressure...
11 Mar 2026
Biztonsági szemle
Chinese Nexus Actors Shift Focus to Qatar Amid Iranian Conflict
Two attacks on Qatari entities signal a shift in focus for China-backed actors and demonstrate how quickly they can pivot in response to geopolitical events.
11 Mar 2026
Biztonsági szemle
Middle East Conflict Highlights Cloud Resilience Gaps
Data centers — used by both governments and militaries for operations — are now fair game, not just for cyberattacks, but for kinetic attacks as well.
11 Mar 2026
Biztonsági szemle
Microsoft Patches 83 CVEs in March Update
For a change, there's little in this month's Patch Tuesday that should cause panic, according to security experts.
10 Mar 2026
Biztonsági szemle
'Overly Permissive' Salesforce Cloud Configs in the Crosshairs
Some customers have mishandled guest user configurations otherwise intended to allow third-party access to important — and sensitive — client data.
10 Mar 2026
Biztonsági szemle
Social media impersonation: The brand threat DMARC can’t see
Social media is often a visibility gap for security teams. Learn how to protect against impersonation and defend this platform.
10 Mar 2026
Biztonsági szemle
Russian Threat Actor Sednit Resurfaces With Sophisticated Toolkit
After several years of using simple implants, the Russia-affiliated actor is back with two new sophisticated malware tools.
10 Mar 2026
Biztonsági szemle
Top 5 Skills to Power Your Career in the Age of AgenticOps
Build the foundational skills that make AgenticOps possible in real enterprise environments.
Pagination
- Previous page ‹‹
- Page 16
- Next page ››