Biztonsági szemle
2026. március 5.
Biztonsági szemle
Fig Security Emerges From Stealth to Fix Broken Security Operations
Fig Security's platform traces security data flows end-to-end across SIEMs, pipelines, and response systems to alert teams before infrastructure changes break critical defenses.
2026. március 5.
Biztonsági szemle
Software Development Practices Help Enterprises Tackle Real-Life Risks
Organizations can borrow secure-by-design processes to manage non-technical challenges like governance or the inevitable human error.
2026. március 5.
Biztonsági szemle
LatAm Now Faces 2x More Cyberattacks Than US
Much of Central and South America struggles with cybersecurity maturity, and hackers are taking advantage.
2026. március 4.
Biztonsági szemle
VMware Aria Operations Bug Exploited, Cloud Resources at Risk
Exploitation of the command injection flaw in VMware Aria Operations could grant an attacker broad acess to victims' cloud environments.
2026. március 4.
Biztonsági szemle
Stranger Things Meets Cybersecurity: Lessons from the Hive Mind
Events and concepts from the Stranger Things television series illustrate how enterprises can defend their networks and stay "right side up."
2026. március 4.
Biztonsági szemle
Are We Ready for Auto Remediation With Agentic AI?
With the rapid innovations in AI, we are entering an exciting era of automated risk remediation. Learn about security team readiness to leverage agentic AI for threat and exposure management.
2026. március 4.
Biztonsági szemle
Dark Reading Confidential: This Threat Hunter Helped Cops Bust Up An African Cybercrime Syndicate
Dark Reading Confidential Episode 15: Interpol relied on Will Thomas and team to help break up a sprawling cybercrime ring, leading to the arrest of 574 suspects, the recovery of more than $3 million, and the decryption of six malware variants. Here...
2026. március 4.
Biztonsági szemle
China's Silver Dragon Razes Governments in EU, SE Asia
The emerging actor, part of the APT41 nexus, gains initial access via phishing, and uses legitimate network services to obscure cyberespionage activities.
2026. március 3.
Biztonsági szemle
Indian APT 'Sloppy Lemming' Targets Defense, Critical Infrastructure
India-nexus cyber threat actors are growing more active and sophisticated, using custom tools coded in Rust and cloud-based command and control.
2026. március 3.
Biztonsági szemle
Vehicle Tire Pressure Sensors Enable Silent Tracking
Like many other features and systems in modern cars, tire pressure sensors leak sensitive data that can be abused by threat actors.
2026. március 3.
Biztonsági szemle
Qualcomm Zero-Day Exploited in Targeted Android Attacks
The exploitation activity against CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups.
2026. március 3.
Biztonsági szemle
Speakeasies to Shadow AI: Banning AI Browsers Will Fail
Lessons from history highlight why AI-enabled browsers require controlled enablement.
Oldalszámozás
- Előző oldal ‹‹
- 20. oldal
- Következő oldal ››