Security Bulletin
5 Nov 2025
Biztonsági szemle
Death by a Thousand Prompts: Open Model Vulnerability Analysis
AI models have become increasingly democratized, and the proliferation and adoption of open weight models has contributed significantly to this reality. Open-weight models provide researchers,… Read more on Cisco Blogs
5 Nov 2025
Biztonsági szemle
Risk 'Comparable' to SolarWinds Incident Lurks in Popular Software Update Tool
Some of the world's biggest technology companies use a program liable to introduce malware into their software. The potential consequences are staggering, but there's an easy fix.
5 Nov 2025
Biztonsági szemle
Closing the AI Execution Gap in Cybersecurity — A CISO Framework
CISOs must navigate five critical dimensions of AI in cybersecurity: augmenting security with AI, automating security with AI, protecting AI systems, defending against AI-powered threats, and aligning AI strategies with business goals. Neglecting any...
5 Nov 2025
Biztonsági szemle
Elusive Iranian APT Phishes Influential US Policy Wonks
Iran is spying on American foreign policy influencers. But exactly which of its government's APTs is responsible remains a mystery.
5 Nov 2025
Biztonsági szemle
ISC Stormcast For Wednesday, November 5th, 2025 https://isc.sans.edu/podcastdetail/9686, (Wed, Nov 5th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
5 Nov 2025
Biztonsági szemle
Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users
The well-known North Korean threat group continues to improve the obfuscation and anti-analysis features of its attack toolchain.
4 Nov 2025
Biztonsági szemle
AI App Spending Report: Where Are the Security Tools?
An analysis of startup firms' spending on AI applications finds the top categories to be productivity and content-generation. Security? Not so much.
4 Nov 2025
Biztonsági szemle
Pro-Russian Hackers Use Linux VMs to Hide in Windows
A threat actor known as "Curly COMrades" is using Linux VMs to remain undetected in Windows environments while conducting Russia-aligned activities.
4 Nov 2025
Biztonsági szemle
Inside the Playbook of Ransomware's Most Profitable Players
Successful ransomware groups have three key elements in common. Spoiler alert: indicators of success don't all revolve around artificial intelligence.
4 Nov 2025
Biztonsági szemle
Europe Sees Increase in Ransomware, Extortion Attacks
European organizations face an escalating cyber threat landscape as attackers leverage geopolitical tensions and AI-enhanced social engineering for attacks.
4 Nov 2025
Biztonsági szemle
When Partners Lead with AI, Everything Changes: Meet Cisco’s 2025 Partner Innovation Challenge Winners
Discover the groundbreaking AI solutions from the 2025 Cisco Partner Innovation Challenge Winners, who are redefining what's possible in student support, sustainable energy, retail optimization, and more. Learn how Cisco partners are leading with AI...
4 Nov 2025
Biztonsági szemle
Using This Knowledgebase
Welcome to ISC's Knowledgebase! This site is intended to provide answers to many of the questions users may have about our open source software products: BIND 9, Kea DHCP, Stork, and ISC DHCP. In this About ISC section, you'll find some general...
Pagination
- Previous page ‹‹
- Page 57
- Next page ››