Security Bulletin
2 Sep 2025
Biztonsági szemle
Zscaler, Palo Alto Networks Breached via Salesloft Drift
Two major security firms suffered downstream compromises as part of a large-scale supply chain attack involving Salesloft Drift, a marketing SaaS application.
2 Sep 2025
Biztonsági szemle
Jaguar Land Rover Shuts Down in Scramble to Secure 'Cyber Incident'
The luxury automaker said its retail and production activities have been "severely disrupted."
2 Sep 2025
Biztonsági szemle
Rebuilding homes and a resilient community in Western North Carolina
Across Western North Carolina, Cisco Crisis Response and 40 Communities are supporting a coalition of partners and community leaders who have come together to repair and rebuild homes in the wake of Hurricane Helene.
2 Sep 2025
Biztonsági szemle
Start your career in IT with CCST certification
Discover how Cisco CCST certification prepares you for in-demand IT roles in IT Support, Networking, and Cybersecurity.
2 Sep 2025
Biztonsági szemle
Marketing Velocity Reimagined Wins Triple Industry Recognition!
Cisco’s Marketing Velocity Reimagined celebrates a triple win in 2025, earning prestigious industry awards for digital innovation, channel partner marketing, and sales excellence—highlighting our commitment to partner success.
2 Sep 2025
Biztonsági szemle
Hackers Are Sophisticated & Impatient — That Can Be Good
You can't negotiate with hackers from a place of fear — but you can turn their urgency against them with the right playbook, people, and preparation.
2 Sep 2025
Biztonsági szemle
NIST Enhances Security Controls for Improved Patching
The US National Institute of Standards and Technology released Security and Privacy Control version 5.2.0 to help organizations be more proactive regarding patching.
2 Sep 2025
Biztonsági szemle
Closing the Backdoor in TACACS+: Why Full-Session Encryption Matters More Than Ever
Attackers exploited weak TACACS+ encryption to steal credentials and evade detection. Learn how Cisco ISE with TLS 1.3 and Duo MFA closes these backdoors.
2 Sep 2025
Biztonsági szemle
JSON Config File Leaks Azure ActiveDirectory Credentials
In this type of misconfiguration, cyberattackers could use exposed secrets to authenticate directly via Microsoft’s OAuth 2.0 endpoints and infiltrate Azure cloud environments.
2 Sep 2025
Biztonsági szemle
A quick look at sextortion at scale: 1,900 messages and 205 Bitcoin addresses spanning four years, (Tue, Sep 2nd)
What can almost 2,000 sextortion messages tell us about how threat actors operate and whether they are successful? Let's find out.
2 Sep 2025
Biztonsági szemle
ISC Stormcast For Tuesday, September 2nd, 2025 https://isc.sans.edu/podcastdetail/9594, (Tue, Sep 2nd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
1 Sep 2025
Biztonsági szemle
Detecting Exposed LLM Servers: A Shodan Case Study on Ollama
We uncovered 1,100+ exposed Ollama LLM servers—20% with open models—revealing critical security gaps and the need for better LLM threat monitoring.
Pagination
- Previous page ‹‹
- Page 34
- Next page ››