Security Bulletin
1 Apr 2026
Biztonsági szemle
LatAm's Self-Taught Cyber Talent Overlooked Amid Cyberattack Glut
A newly released study exclusively shared with Dark Reading details the unique circumstances that make up Latin America's labor pool, and why organizations may want to expand their talent search.
1 Apr 2026
Biztonsági szemle
Identifying and remediating a persistent memory compromise in Claude Code
We recently discovered a method to compromise Claude Code’s memory and maintain persistence beyond our immediate session into every project, every session, and even after reboots. In this post, we’ll break down how we were able to poison an AI.....
1 Apr 2026
Biztonsági szemle
Cyberattacks Intensify Pressure on Latin American Governments
Cyber threats across Latin America are increasingly targeting government systems, from disruptive attacks in Puerto Rico to a surge of probes against Colombia’s health sector.
1 Apr 2026
Biztonsági szemle
DORA Compliance at Scale: A Technical Account of Intesa Sanpaolo’s Transformation
CX Engineers share the tech behind Intesa Sanpaolo achieving DORA compliance.
1 Apr 2026
Biztonsági szemle
Why full-stack post-quantum cryptography cannot wait
Full-stack post-quantum cryptography (PQC) is the architectural framework introduced with Cisco IOS XE 26. It is designed to safeguard devices at every layer—securing boot processes, image integrity, network traffic, and management sessions.
1 Apr 2026
Biztonsági szemle
Venom Stealer MaaS Platform Commoditizes ClickFix Attacks
A new service on the cybercrime market provides automated capabilities to create persistent information-stealing social engineering attacks.
1 Apr 2026
Biztonsági szemle
How Visibility-Driven Segmentation is Redefining the OT Security Starting Line
Cisco at S4x26 showcased how Cyber Vision enables OT asset discovery and segmentation without extra hardware, while also demonstrating the power of Splunk — driving visibility, control, and streamlined SecOps workflows to cut OT cyber risk.
1 Apr 2026
Biztonsági szemle
Beyond MTTR: Why the future of IT is preventative, not reactive
Learn how Cisco IT is evolving beyond reactive MTTR by leveraging unified observability, AI-driven workflows, and centralized data to prevent incidents before they impact users.
1 Apr 2026
Biztonsági szemle
Are We Training AI Too Late?
Ask the Expert: Cybersecurity teams need to expand their field of view to include new, unique threat sources, rather than relying on past, proven threat actors.
1 Apr 2026
Biztonsági szemle
Riasztás az Axios npm csomag kompromittálódásról
A Nemzetbiztonsági Szakszolgálat Nemzeti Kiberbiztonsági Intézet (NBSZ NKI) riasztást ad ki az Axios JavaScript könyvtár npm ellátási láncát érintő kritikus kompromittálódás miatt.
1 Apr 2026
Biztonsági szemle
Don’t deploy OpenClaw without securing it – Try this opensource solution and hands-on lab
OpenClaw enables powerful AI agent workflows—but introduces new security risks. Learn why securing tools, MCP servers, and agent-generated code is critical, and how DefenseClaw helps protect your environment.
1 Apr 2026
Biztonsági szemle
The Forgotten Endpoint: Security Risks of Dormant Devices
Technology Talk: That forgotten notebook holds plenty of secrets to enterprise access.
Pagination
- Previous page ‹‹
- Page 3
- Next page ››