Security Bulletin
29 Apr 2025
Biztonsági szemle
Legacy to Leading Edge: Why Automated Microsegmentation is the New Security Standard - Albert Estevez Polo - RSAC25 #2
29 Apr 2025
Biztonsági szemle
US Critical Infrastructure Still Struggles With OT Security
How does a company defend itself from cyberattacks by a foreign adversary? A collection of experts gathered at this year's RSAC Conference to explain how the US can help.
29 Apr 2025
Biztonsági szemle
More Scans for SMS Gateways and APIs, (Tue, Apr 29th)
Last week, I wrote about scans for Teltonika Networks SMS Gateways. Attackers are always looking for cheap (free) ways to send SMS messages and gain access to not-blocklisted numbers. So, I took a closer look at similar scans we have seen.
29 Apr 2025
Biztonsági szemle
MCP for DevOps – Series Opener and MCP Architecture Intro
MCP for DevOps – Series Opener and MCP Architecture Intro You have undoubtedly heard about Anthropic’s MCP (Model Context Protocol) open source project. If you haven’t, I hope your vacation on a remote island without internet access was lovely! As a...
29 Apr 2025
Biztonsági szemle
Risks of Using AI Models Developed by Competing Nations
The current offline/open source model boom is unstoppable. Its impact depends on how well the risks are managed today.
29 Apr 2025
Biztonsági szemle
ECSS Learning Path: Level up Your Security Stack with Splunk on Cisco
Unified security intelligence, streamlined workflows, and real-time threat monitoring. Discover the ECSS Learning Path, your fast track to leverage the full potential of Splunk on Cisco.
29 Apr 2025
Biztonsági szemle
Windows Backdoor Targets Members of Exiled Uyghur Community
A spear-phishing campaign sent Trojanized versions of legitimate word-processing software to members of the World Uyghur Congress as part of China's continued cyber-espionage activity against the ethnic minority.
29 Apr 2025
Biztonsági szemle
NVIDIA's New AI Security Offering Protects Against Software Landmines
NVIDIA's DOCA Argus prevents attacks before they compromise AI architectures.
29 Apr 2025
Biztonsági szemle
Instant Attack Verification: Verification to Trust Automated Response
Discover how Cisco XDR’s Instant Attack Verification brings real-time threat validation for faster, smarter SOC response.
29 Apr 2025
Biztonsági szemle
Delta Electronics ISPSoft
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.4 ATTENTION: Low attack complexity Vendor: Delta Electronics Equipment: ISPSoft Vulnerabilities: Stack-based Buffer Overflow, Out-of-bounds Write 2. RISK EVALUATION Successful exploitation of these...
29 Apr 2025
Biztonsági szemle
Rockwell Automation ThinManager
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: ThinManager Vulnerabilities: Improper Restriction of Operations within the Bounds of a Memory Buffer, Incorrect...
29 Apr 2025
Biztonsági szemle
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-31324 SAP NetWeaver Unrestricted File Upload Vulnerability These types of vulnerabilities are frequent attack...
Pagination
- Previous page ‹‹
- Page 233
- Next page ››