Security Bulletin
24 Feb 2026
Biztonsági szemle
Attackers Now Need Just 29 Minutes to Own a Network
Credential misuse, AI tools, and security blind spots help attackers move through breached networks faster than ever, CrowdStrike finds.
24 Feb 2026
Biztonsági szemle
Lazarus Group Picks a New Poison: Medusa Ransomware
The North Korean threat group also leveraged Comebacker backdoor, Blindingcan RAT, and info stealer Infohook in its recent attacks.
24 Feb 2026
Biztonsági szemle
Turning AI Security Barriers into Partner Growth: Recap from Cisco Live EMEA and AI Summit
Discover how Cisco is securing the "Agentic Era." Get the full recap from Cisco Live EMEA and the AI Summit, featuring new innovations in AI Defense, the launch of the Cisco 360 Partner Program, and strategies to turn security barriers into growth...
24 Feb 2026
Biztonsági szemle
As Cybersecurity Firms Chase AI, VC Market Skyrockets
Investments in cybersecurity startups took off in 2025, as venture capital firms focused not just on AI-native tech, but talent as well.
24 Feb 2026
Biztonsági szemle
From Factory Floors to CyberSecurity: How Cisco Helped Me Build My Dream Career
From factory floors to CCIE Security, Technical Solutions Engineer Pamela R. shares how Cisco helped her turn a distant dream into a thriving reality.
24 Feb 2026
Biztonsági szemle
Modernizing TACACS+: Why Full-Session Encryption Matters More Than Ever
Protect your network from Salt Typhoon-style attacks. Learn how Cisco ISE 3.4 uses TACACS+ over TLS 1.3 and Duo MFA to provide full-session encryption.
23 Feb 2026
Biztonsági szemle
Spitting Cash: ATM Jackpotting Attacks Surged in 2025
The attacks cost banks more than $20 million in losses last year, as criminals used many of the same tools and tactics they have wielded for more than a decade.
23 Feb 2026
Biztonsági szemle
More Than Dashboards: AI Decisions Must Be Provable
AI systems have to be able to show a record of what happened and how.
23 Feb 2026
Biztonsági szemle
Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount
The long-active Iranian threat group debuted various attack strains and payloads in attacks against organizations in the Middle East and Africa.
23 Feb 2026
Biztonsági szemle
Enigma Cipher Device Still Holds Secrets for Cyber Pros
The Nazi relic's history is riddled with resilience errors, and those lessons still apply to defending against modern cyber threats.
23 Feb 2026
Biztonsági szemle
600+ FortiGate Devices Hacked by AI-Armed Amateur
A Russian-speaking hacker used generative AI to compromise the FortiGate firewalls, targeting credentials and backups for possible follow-on ransomware attacks.
23 Feb 2026
Biztonsági szemle
New Partner Enablement Capabilities: Accelerating Your Path to Success
Discover the five new Cisco partner enablement capabilities now live. From AI-powered assistants and curated learning journeys to enhanced demo tools and shared quarterly development focus, learn how these resources help partners accelerate growth...
Pagination
- Previous page ‹‹
- Page 24
- Next page ››