Security Bulletin
6 Feb 2026
Biztonsági szemle
Cisco Deep Network Model: Purpose built intelligence for networking
This blog was written in collaboration with Yuqing Gao, Jian Tan, Fan Bu, Ali Dabir, Hamid Amini, Doosan Jung, Yury Sokolov, Lei Jin, and Derek Engi. LLMs can sound very convincing, but in network operations, sounding right isn’t enough. Network...
6 Feb 2026
Biztonsági szemle
The future was written at Cisco AI Summit
Cisco AI Summit brought together the visionaries, technologists, and leaders shaping the AI economy for one of the most-watched technology events in recent history.
5 Feb 2026
Biztonsági szemle
EnCase Driver Weaponized as EDR Killers Persist
The forensic tool's driver was signed with a digital certificate that expired years ago, but major security gaps allowed Windows to load it.
5 Feb 2026
Biztonsági szemle
Agentic AI Site 'Moltbook' Is Riddled With Security Risks
Someone used AI to build an entire Web platform, which then did something predictable and preventable: It exposed all its data through a publicly accessible API.
5 Feb 2026
Biztonsági szemle
Data Tool to Triage Exploited Vulnerabilities Can Make KEV More Useful
A disconnect exists between an organization's cybersecurity needs and lists like CISA's KEV Catalog. KEV Collider combines data from multiple open source vulnerability frameworks to help security teams quickly assess which are important, based on...
5 Feb 2026
Biztonsági szemle
Partner Profitability Is Changing — Are You Building for Durability?
Stop building for the next transaction and start building for the next decade. Discover how the Cisco 360 Partner Program helps partners unlock a $6.06 revenue multiplier by mastering managed services, customer lifecycle practices, and recurring...
5 Feb 2026
Biztonsági szemle
Cisco Live Amsterdam: Join Us at ‘Leading the AI Revolution’
AI is no longer just a technology—it’s a new lever of national power, competitiveness, and strategic advantage. As governments and organizations grapple with the promise and complexity of AI, q… Read more on Cisco Blogs
5 Feb 2026
Biztonsági szemle
Developing a National Cybersecurity Strategy in the AI Era: A Playbook for Government
Just last year, Rwandan Minister of IT and Innovation Paula Ingabire called on countries to come together to confront cyber threats that are now unfolding at global scale. As she noted, emerging technologies—from AI and robotics to IoT and blockchain...
5 Feb 2026
Biztonsági szemle
Elevating Meraki Operations with Red Hat Ansible Automation Platform
In our previous blog, “Streamline Operations with Cisco Meraki and Red Hat Ansible Automation,” we introduced the powerful integration between Cisco Meraki’s cloud-managed networking and Red Hat… Read more on Cisco Blogs
5 Feb 2026
Biztonsági szemle
Cyber Success Trifecta: Education, Certifications & Experience
Colonel Georgeo Xavier Pulikkathara, CISO at iMerit discusses the importance of fundamentals, continuous learning, and human ingenuity in the face of AI-driven cybersecurity evolution.
5 Feb 2026
Biztonsági szemle
Facing the Quantum Threat: Cisco’s Strategic Approach to PQC
Quantum threats are closer than you think. Explore Cisco’s strategic approach to Post-Quantum Cryptography (PQC) and how to protect against HNDL risks now.
5 Feb 2026
Biztonsági szemle
How to use the perfdhcp DHCP testing tool
Introduction perfdhcp is a tool to generate DHCP client traffic. It can be used to benchmark DHCP server performance, or to reproduce specific scenarios for testing. It is capable of simulating most client interactions, but there are some small...
Pagination
- Previous page ‹‹
- Page 5
- Next page ››