Security Bulletin

2 Oct 2025
Biztonsági szemle
'Confucius' Cyberspy Evolves From Stealers to Backdoors in Pakistan
The long-running South Asian advanced persistent threat (APT) group is advancing its objectives against Pakistani targets, with a shift to deploying Python-based surveillance malware.

2 Oct 2025
Biztonsági szemle
Android Spyware in the UAE Masquerades as ... Spyware
In a clever, messed-up twist on brand impersonation, attackers are passing off their spyware as a notorious UAE government surveillance app.

2 Oct 2025
Biztonsági szemle
ISC Stormcast For Thursday, October 2nd, 2025 https://isc.sans.edu/podcastdetail/9638, (Thu, Oct 2nd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

1 Oct 2025
Biztonsági szemle
Google Sheds Light on ShinyHunters' Salesforce Tactics
Mandiant provided proactive defenses against UNC6040's social engineering attacks that have led to several Salesforce breaches.

1 Oct 2025
Biztonsági szemle
Shutdown Threatens US Intel Sharing, Cyber Defense
Lapse of critical information sharing and mass furloughs at CISA are just some of the concerns.

1 Oct 2025
Biztonsági szemle
Exceeding Expectations: How Partner Managed Services and the Cisco 360 Partner Program Accelerate Revenue Growth
Discover how the Cisco 360 Partner Program integrates managed services at its core to boost your profitability, reward growth, and help your MSP business succeed.

1 Oct 2025
Biztonsági szemle
Craft your Next-Gen, Open, and AI-Ready Data Center with SONiC and Cisco 8000
For customers seeking choice and open-source solutions for their network operating systems, Cisco offers robust support for SONiC on Silicon One and Cisco 8000 Series Switches. This approach empowers organizations to select the network operating...

1 Oct 2025
Biztonsági szemle
Don’t Miss Out: Attend the 2025 OCP Global Summit
The 2025 OCP Global Summit is fast approaching, and Cisco is set to showcase its latest innovations in AI networking, security, and open networking. Discover how these groundbreaking solutions from Cisco—spanning AI infrastructure, P4 programmability...

1 Oct 2025
Biztonsági szemle
A $50 'Battering RAM' Can Bust Confidential Computing
Researchers have demonstrated an attack that can break through modern Intel and AMD processor technologies that protect encrypted data stored in memory.

1 Oct 2025
Biztonsági szemle
Undead Operating Systems Haunt Enterprise Security Networks
Windows 10 reaches end-of-life on Oct. 14, which will triple the number of vulnerable enterprise systems and create a massive attack surface for cybercriminals.

1 Oct 2025
Biztonsági szemle
Canadian Bacon Cybersecurity: SharePoint Vulnerabilities and Vulnerabilities in General
Learn about the Microsoft SharePoint vulnerability and which steps you can take to mitigate the effects of this — and other — vulnerabilities.

1 Oct 2025
Biztonsági szemle
Connected Intelligence: Building the workplace of today for the workforce of tomorrow
Today, as artificial intelligence reshapes our world, the fabric of how we work—and who we work and connect with—is changing in ways we have only ever imagined. Tomorrow’s workplaces will look dramatically different—not just because of new...
Pagination
- Previous page ‹‹
- Page 10
- Next page ››