Security Bulletin

8 Sep 2025
Biztonsági szemle
Transforming Infrastructure for the AI Era
Discover how Cisco helps hyperscale, neocloud, service provider, and enterprise customers evolve their networks for AI with high-performing pluggable optics for AI data centers and by connecting data centers with coherent pluggable optics that...

8 Sep 2025
Biztonsági szemle
The Critical Failure in Vulnerability Management
Organizations are seeking assistance to fix critical vulnerabilities. Solutions that orchestrate and automate network device protection put us on the right path.

8 Sep 2025
Biztonsági szemle
Security Fused into the Network to Protect OT at Scale
Learn how Cisco's integrated approach, embedding OT asset visibility and secure remote access into industrial switches, eliminates security blind spots, reduces TCO, and fosters IT and OT collaboration.

8 Sep 2025
Biztonsági szemle
HTTP Request Signatures, (Mon, Sep 8th)
This weekend, I noticed three related headers being used in requests to some of our honeypots for the first time [1]:

8 Sep 2025
Biztonsági szemle
IPv6 in 2025 – The Freedom of Address Space
Discover how embracing IPv6’s vast address space can simplify your network design and unlock new possibilities—plus, learn how Cisco is supporting customers on their journey to an IPv6-powered future.

8 Sep 2025
Biztonsági szemle
Zero Trust in the Era of Agentic AI
AI agents use the same networking infrastructure as users and apps. So security solutions like zero trust should evolve to protect agentic AI communications.

8 Sep 2025
Biztonsági szemle
45 New Domains Linked to Salt Typhoon, UNC4841
The China-backed threat actors have used the previously undiscovered infrastructure to obtain long-term, stealthy access to targeted organizations.

8 Sep 2025
Biztonsági szemle
ISC Stormcast For Monday, September 8th, 2025 https://isc.sans.edu/podcastdetail/9602, (Mon, Sep 8th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

5 Sep 2025
Biztonsági szemle
How Has IoT Security Changed Over the Past 5 Years?
Experts agree there have been subtle improvements, with new laws and applied best practices, but there is still a long way to go.

5 Sep 2025
Biztonsági szemle
Critical SAP S/4HANA Vulnerability Under Attack, Patch Now
Exploitation of CVE-2025-42957 requires "minimal effort" and can result in a complete compromise of the SAP system and host OS, according to researchers.

5 Sep 2025
Biztonsági szemle
Anyone Using Agentic AI Needs to Understand Toxic Flows
The biggest vulnerabilities may lie at the boundaries of where the AI agent connects with the enterprise system.

5 Sep 2025
Biztonsági szemle
Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT'
TAG-150 is running a multifaceted and relatively successful malware-as-a-service operation, without advertising itself on the Dark Web.
Pagination
- Previous page ‹‹
- Page 29
- Next page ››