Security Bulletin
26 Mar 2025
Biztonsági szemle
Unlocking the Power of Network Telemetry for the US Public Sector
Co-authors: Lou Norman and Erich Stokes A golden nugget can be seen as a valuable piece of information that significantly enhances security measures. In cybersecurity, identifying and leveraging such golden nuggets can be crucial for maintaining...
26 Mar 2025
Biztonsági szemle
The Benefits of a Broad and Open Integration Ecosystem
Since inception, Cisco XDR has followed the Open XDR philosophy. We integrate telemetry and data from dozens of Cisco and third-party security solutions.
26 Mar 2025
Biztonsági szemle
Google Hastily Patches Chrome Zero-Day Exploited by APT
Researchers at Kaspersky discovered cyber-espionage activity that used the vulnerability in a one-click phishing attack to deliver malware.
26 Mar 2025
Biztonsági szemle
Public-Private Ops Net Big Wins Against African Cybercrime
Three cybersecurity firms worked with Interpol and authorities in Nigeria, South Africa, Rwanda, and four other African nations to arrest more than 300 cybercriminals.
26 Mar 2025
Biztonsági szemle
ISC Stormcast For Wednesday, March 26th, 2025 https://isc.sans.edu/podcastdetail/9380, (Wed, Mar 26th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
26 Mar 2025
Biztonsági szemle
[Guest Diary] Leveraging CNNs and Entropy-Based Feature Selection to Identify Potential Malware Artifacts of Interest, (Wed, Mar 26th)
[This is a Guest Diary by Wee Ki Joon, an ISC intern as part of the SANS.edu Bachelor's Degree in Applied Cybersecurity (BACS) program [1].]
25 Mar 2025
Biztonsági szemle
Chinese hackers spend years roaming telecommunications service
China Chopper malware allowed threat group "Weaver Ant" to remain undetected for years.
25 Mar 2025
Biztonsági szemle
Security Tech That Can Make a Difference During an Attack
The recent report of how Volt Typhoon compromised systems at a water utility highlight security technologies and processes that helped detect the compromise and clean up the network.
25 Mar 2025
Biztonsági szemle
Security Tech That Can Make a Difference During an Attack
The recent report of how Volt Typhoon compromised systems at a water utility highlight security technologies and processes that helped detect the compromise and clean up the network.
25 Mar 2025
Biztonsági szemle
Curdled Miscreant, VanHelsing, MFA, Room 237, MFA, Velora, 23nMe, Josh Marpet... - SWN #462
25 Mar 2025
Biztonsági szemle
OPSEC Nightmare: Leaking US Military Plans to a Reporter
Experts say the leakage of US military plans to a reporter this month reflects a severe operational security failure on the part of US leadership.
25 Mar 2025
Biztonsági szemle
South African Poultry Company Reports $1M Loss After Cyber Intrusion
The company reports that no sensitive information was breached or stolen in the cyber intrusion and that its operations are running normally again.
Pagination
- Previous page ‹‹
- Page 289
- Next page ››