Security Bulletin
17 Dec 2025
Biztonsági szemle
Critical Fortinet Flaws Under Active Attack
Attackers targeted admin accounts, and once authenticated, exported device configurations including hashed credentials and other sensitive information.
17 Dec 2025
Biztonsági szemle
In Cybersecurity, Claude Leaves Other LLMs in the Dust
Anthropic proves that LLMs can be fairly resistant to abuse. Most developers are either incapable of building safer tools, or unwilling to invest in doing so.
17 Dec 2025
Biztonsági szemle
'Cellik' Android RAT Leverages Google Play Store
The remote access Trojan lets an attacker remotely control a victim's phone and can generate malicious apps from inside the Play Store.
17 Dec 2025
Biztonsági szemle
Securing the Network Edge: A Comprehensive Framework for Modern Cybersecurity
The future of cybersecurity means defending everywhere. Securing IoT, cloud, and remote work requires a unified edge-to-cloud strategy. (First in a three-part series.)
17 Dec 2025
Biztonsági szemle
The Future of Quantum-Safe Networks Depends on Interoperable Standards
As quantum computing advances, secure, interoperable standards will be critical to making quantum key distribution (QKD) practical, trusted, and future-proof.
17 Dec 2025
Biztonsági szemle
Maybe a Little Bit More Interesting React2Shell Exploit, (Wed, Dec 17th)
I have already talked about various React2Shell exploit attempts we have observed in the last weeks. But new varieties of the exploit are popping up, and the most recent one is using this particular version of the exploit:
17 Dec 2025
Biztonsági szemle
Deck the halls with Webex calls: How Cisco technology brings holiday cheer to hospitals
Cisco’s Connected Santa program brings Christmas cheer to children in hospitals through the power of Webex and a team of dedicated Cisco volunteers. Discover the secrets behind the holiday magic.
17 Dec 2025
Biztonsági szemle
Attackers Use Stolen AWS Credentials in Cryptomining Campaign
Threat actors wielding stolen AWS Identity and Access Management (IAM) credentials leverage Amazon EC and EC2 infrastructure across multiple customer environments.
17 Dec 2025
Biztonsági szemle
Sarah Saves the Season: Keeping Stores Connected Through the Holiday Rush
Learn how Cisco Meraki Client Analytics (with Zebra integration), Roaming Health, and Proactive Packet Capture features revolutionize wireless network troubleshooting.
17 Dec 2025
Biztonsági szemle
Five Ways Network Assurance Enables Critical AI Infrastructure
Is your network ready for AI traffic? Discover five ways proactive network assurance can optimize AI workloads—without slowing down everything else.
17 Dec 2025
Biztonsági szemle
"Fake Proof" and AI Slop Hobble Defenders
In the React2Shell saga, non-working and trivial proof-of-concept exploits led to confusion and perhaps a false sense of security. Can the onslaught of PoCs be tamed?
17 Dec 2025
Biztonsági szemle
Unify IT Asset Management and Network Security in Real Time: Cisco ISE and ServiceNow Are Redefining Asset-Aware Access
Cisco ISE and ServiceNow are redefining asset-aware access by unifying IT asset management and network security in real time.
Pagination
- Previous page ‹‹
- Page 30
- Next page ››