Security Bulletin
30 Jan 2026
Biztonsági szemle
ISC Stormcast For Friday, January 30th, 2026 https://isc.sans.edu/podcastdetail/9788, (Fri, Jan 30th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
30 Jan 2026
Biztonsági szemle
Chinese APTs Hacking Asian Orgs With High-End Malware
Advanced persistent threat (APT) groups have deployed new cyber weapons against a variety of targets, highlighting the increasing threats to the region.
29 Jan 2026
Biztonsági szemle
Trump Administration Rescinds Biden-Era SBOM Guidance
Federal agencies will no longer be required to solicit software bills of material (SBOMs) from tech vendors, nor attestations that they comply with NIST's Secure Software Development Framework (SSDF). What that means long term is unclear.
29 Jan 2026
Biztonsági szemle
More Critical Flaws on n8n Could Compromise Customer Security
A new around of vulnerabilities in the popular AI automation platform could let attackers hijack servers and steal credentials.
29 Jan 2026
Biztonsági szemle
MCP and A2A: A Network Engineer’s Mental Model for Agentic AI
The Model Context Protocol (MCP) and Agent-to-Agent (A2A) have gained a significant industry attention over the past year. MCP first grabbed the world’s attention in dramatic fashion when it was published by Anthropic in November 2024, garnering tens...
29 Jan 2026
Biztonsági szemle
TAG Bulletin: Q4 2025
An overview of coordinated influence operation campaigns terminated on our platforms in Q4 2025.
29 Jan 2026
Biztonsági szemle
Unlock Real-Time Multi-Cluster Monitoring with Cisco Catalyst Center Global Manager at Cisco Live Amsterdam
Are you attending Cisco Live Amsterdam and looking to elevate your network monitoring skills? Don’t miss the chance to join the DevNet Labs Studio session titled “Unified Cisco Catalyst Center Monitoring: Building a Real-Time Multi-Cluster Health...
29 Jan 2026
Biztonsági szemle
'Semantic Chaining' Jailbreak Dupes Gemini Nano Banana, Grok 4
If an attacker splits a malicious prompt into discrete chunks, some large language models (LLMs) will get lost in the details and miss the true intent.
29 Jan 2026
Biztonsági szemle
Cisco Compute Solutions and Red Hat Ansible Supercharge Infrastructure Management
Tasks that once took hours now take minutes. See how Cisco and Red Hat’s expanded Ansible automation capabilities—including over 100 modules and a comprehensive Cisco Validated Design—are helping IT teams reclaim time and reduce operational...
29 Jan 2026
Biztonsági szemle
From Quantum to AI Risks: Preparing for Cybersecurity's Future
As 2026 begins, these journalists urge the cybersecurity industry to prioritize patching vulnerabilities, preparing for quantum threats, and refining AI applications, in the latest edition of Reporters' Notebook.
29 Jan 2026
Biztonsági szemle
DNSSEC signing with an offline KSK
This article describes how to configure and operate BIND 9 with an offline KSK. It is assumed that the reader has a general understanding of DNSSEC. Supported BIND 9 versions The Offline KSK feature was introduced in BIND 9.20.2. Support for KSK...
29 Jan 2026
Biztonsági szemle
AI search framework that teaches AI models to think like experts
Cisco Foundation AI introduces AI search framework for more efficient search by models
Pagination
- Previous page ‹‹
- Page 39
- Next page ››