Security Bulletin
5 Nov 2025
Biztonsági szemle
Beyond Survival: New York’s Game-Changing Investment in Safety Net Hospitals
Discover how New York’s groundbreaking Safety Net Transformation Program is set to revolutionize healthcare for underserved communities—empowering safety net hospitals with modern technology, strategic partnerships, and vital funding for a healthier...
5 Nov 2025
Biztonsági szemle
Updates to Domainname API, (Wed, Nov 5th)
For several years, we have offered a "new domain" list of recently registered (or, more accurately, recently discovered) domains. This list is offered via our API ( https://isc.sans.edu/api). However, the size of the list has been causing issues...
5 Nov 2025
Biztonsági szemle
The Future of Collaboration is Here: Cisco CCNP Collaboration Updates
What CCNP Collaboration learners need to know about Cisco's 2026 certification updates.
5 Nov 2025
Biztonsági szemle
Operational Technology Security Poses Inherent Risks for Manufacturers
Despite increased awareness, manufacturers continue to face an onslaught of attacks.
5 Nov 2025
Biztonsági szemle
Critical Site Takeover Flaw Affects 400K WordPress Sites
Attackers are already targeting a vulnerability in the Post SMTP plug-in that allows them to fully compromise an account and website for nefarious purposes.
5 Nov 2025
Biztonsági szemle
Death by a Thousand Prompts: Open Model Vulnerability Analysis
AI models have become increasingly democratized, and the proliferation and adoption of open weight models has contributed significantly to this reality. Open-weight models provide researchers,… Read more on Cisco Blogs
5 Nov 2025
Biztonsági szemle
Risk 'Comparable' to SolarWinds Incident Lurks in Popular Software Update Tool
Some of the world's biggest technology companies use a program liable to introduce malware into their software. The potential consequences are staggering, but there's an easy fix.
5 Nov 2025
Biztonsági szemle
Closing the AI Execution Gap in Cybersecurity — A CISO Framework
CISOs must navigate five critical dimensions of AI in cybersecurity: augmenting security with AI, automating security with AI, protecting AI systems, defending against AI-powered threats, and aligning AI strategies with business goals. Neglecting any...
5 Nov 2025
Biztonsági szemle
Elusive Iranian APT Phishes Influential US Policy Wonks
Iran is spying on American foreign policy influencers. But exactly which of its government's APTs is responsible remains a mystery.
5 Nov 2025
Biztonsági szemle
ISC Stormcast For Wednesday, November 5th, 2025 https://isc.sans.edu/podcastdetail/9686, (Wed, Nov 5th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
5 Nov 2025
Biztonsági szemle
Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users
The well-known North Korean threat group continues to improve the obfuscation and anti-analysis features of its attack toolchain.
4 Nov 2025
Biztonsági szemle
AI App Spending Report: Where Are the Security Tools?
An analysis of startup firms' spending on AI applications finds the top categories to be productivity and content-generation. Security? Not so much.
Pagination
- Previous page ‹‹
- Page 24
- Next page ››