Security Bulletin
29 Oct 2025
Biztonsági szemle
CVE-2025-11232: Invalid characters cause assert
CVE: CVE-2025-11232 Title: Invalid characters cause assert Document version: 2.0 Posting date: 29 October 2025 Program impacted: Kea Versions affected: Kea 3.0.1 -> 3.0.1 3.1.1 -> 3.1.2 Versions NOT affected: Kea 2.6.0 -> 2.6.4 2.7.0 -> 2.7.9 3.0.0 -...
29 Oct 2025
Biztonsági szemle
Cyber resilience for all: How Cisco and NIIT Foundation are securing India’s digital future
As India's digital transformation accelerates, Cisco and NIIT Foundation are meeting the moment with Cyber Suraksha — training over one million people in cybersecurity while creating pathways to opportunity and building a safer, more digitally...
29 Oct 2025
Biztonsági szemle
Cybersecurity Firms See Surge in AI-Powered Attacks Across Africa
Africa becomes a proving ground for AI-driven phishing, deepfakes, and impersonation, with attackers testing techniques against governments and enterprises.
29 Oct 2025
Biztonsági szemle
How to collect memory-only filesystems on Linux systems, (Wed, Oct 29th)
I've been doing Unix/Linux IR and Forensics for a long time. I logged into a Unix system for the first time in 1983. That's one of the reasons I love teaching FOR577[1], because I have stories that go back to before some of my...
29 Oct 2025
Biztonsági szemle
ISC Stormcast For Wednesday, October 29th, 2025 https://isc.sans.edu/podcastdetail/9676, (Wed, Oct 29th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
29 Oct 2025
Biztonsági szemle
AI-Generated Code Poses Security, Bloat Challenges
Development teams that fail to create processes around AI-generated code face more technical and security debt, as vulnerabilities get replicated.
28 Oct 2025
Biztonsági szemle
Inside the Data on Insider Threats: What 1,000 Real Cases Reveal About Hidden Risk
Security analyst Michael Robinson spent 14 months mining thousands of legal filings to uncover who malicious insiders really are, how they operate, and why traditional detection models keep missing them.
28 Oct 2025
Biztonsági szemle
From Chef to CISO: An Empathy-First Approach to Cybersecurity Leadership
Myke Lyons, CISO at data-processing SaaS company Cribl, shares how he cooked up an unconventional journey from culinary school to cybersecurity leadership.
28 Oct 2025
Biztonsági szemle
The AI Trust Paradox: Why Security Teams Fear Automated Remediation
Security teams invest in AI for automated remediation but hesitate to trust it fully due to fears of unintended consequences and lack of transparency.
28 Oct 2025
Biztonsági szemle
YouTube Ghost Network Utilizes Spooky Tactics to Target Users
The malware operation uses compromised accounts and bot networks to distribute infostealers and has tripled its output in 2025.
28 Oct 2025
Biztonsági szemle
Oracle EBS Attack Victims May Be More Numerous Than Expected
Numerous organizations have been attacked via Oracle EBS zero-day CVE-2025-61882, and evidence suggests more like Schneider Electric could be on that list.
28 Oct 2025
Biztonsági szemle
Cisco Nexus Delivers New AI Innovations with NVIDIA
As AI drives unprecedented data traffic and complexity within data centers, modern networking infrastructure must deliver high-performance, scalable, and secure switching to keep pace. This blog explores how Cisco innovations like the Cisco N9100...
Pagination
- Previous page ‹‹
- Page 30
- Next page ››