Biztonsági szemle
![](/sites/default/files/styles/narrow_1x/public/feeds/86/20240603-121829.png.webp?itok=b76yEocl)
2024. jún. 3.
Biztonsági szemle
A Wireshark Lua Dissector for Fixed Field Length Protocols, (Mon, Jun 3rd)
I developed a Wireshark dissector in Lua to parse binary protocols (over TCP) that are composed of fields with fixed lengths. I got this idea while taking a SANS ICS training: for protocol reversing, it would be useful to have a dissector where I can...
![APIs](/sites/default/files/styles/narrow_1x/public/feeds/73/053025_api.jpg.webp?itok=_webCmMr)
2024. jún. 3.
Biztonsági szemle
Three ways to deliver API security
Here are three ways to build APIs that deliver the functionality and security modern organizations need.
![](/sites/default/files/styles/narrow_1x/public/feeds/37/logo_nki_fb_1200x630.png.webp?itok=VyX_pPZy)
2024. jún. 3.
Biztonsági szemle
Improved Guidance for Azure Network Service Tags
Summary Microsoft Security Response Center (MSRC) was notified in January 2024 by our industry partner, Tenable Inc., about the potential for cross-tenant access to web resources using the service tags feature. Microsoft acknowledged that Tenable...
![](/sites/default/files/styles/narrow_1x/public/feeds/bb/Mehaniq-kenya-cyber-code-shutterstock.jpg.webp?itok=F3gX_-_H)
2024. jún. 3.
Biztonsági szemle
As Allies, Kenya & US Aim to Bolster Digital Security in Africa
Amid surging attacks, Kenya aims to expand its technology sector and improve cybersecurity to protect the country's fast-growing digital economy.
![](/sites/default/files/styles/narrow_1x/public/feeds/bf/large.png.webp?itok=kmaKhout)
2024. jún. 3.
Biztonsági szemle
ISC Stormcast For Monday, June 3rd, 2024 https://isc.sans.edu/podcastdetail/9006, (Mon, Jun 3rd)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
![](/sites/default/files/styles/narrow_1x/public/feeds/63/CDO.jpg.webp?itok=2wu1zfb5)
2024. jún. 2.
Biztonsági szemle
Cisco Defense Orchestrator’s Path to FedRAMP Authorization
Join us as we shed some light on the status and processes involved for achieving FedRAMP® Authorization for Cisco Defense Orchestrator (CDO).
![](/sites/default/files/styles/narrow_1x/public/feeds/c4/Blog-Feature-Images-3-scaled.jpg.webp?itok=wZkWIpO9)
2024. jún. 1.
Biztonsági szemle
For the Love of Learning: We’re Here for You at Cisco Live 2024 Las Vegas!
As thousands make their way to Las Vegas for Cisco Live 2024, go beyond the love of learning and discover a unified, holistic learning experience in the all-new Up-Skill Hub, where you'll find the Learning & Certifications booth and the DevNet Zone...
![<p>(Credit: AdriaVidal – stock.adobe.com)</p>](/sites/default/files/styles/narrow_1x/public/feeds/70/AdobeStock_603723456_Editorial_Use_Only.jpg.webp?itok=mqaFxLNC)
2024. máj. 31.
Biztonsági szemle
OpenAI report reveals threat actors using ChatGPT in influence operations
The report details OpenAI’s disruption of the deceptive campaigns, which had minimal public impact.
![](/sites/default/files/styles/narrow_1x/public/feeds/00/magnifyingglass_Brain_light_Alamy_Stock_Photo.jpg.webp?itok=OyjUk9jz)
2024. máj. 31.
Biztonsági szemle
Lawyers Ask Forensics Investigators for Help Outside Cybersecurity
Attorneys are increasingly realizing that forensics investigators have skills analyzing documents and uncovering digital clues that could help them in non-cybersecurity cases.
![](/sites/default/files/styles/narrow_1x/public/feeds/37/blog-1.jpg.webp?itok=zUeap8Um)
2024. máj. 31.
Biztonsági szemle
Nexus Dashboard Essentials: Learn How to Manage Your Data Center Fabric Like a Pro
Go from novice to pro-level prowess with the Cisco Data Center Nexus Dashboard Essentials | DCNDE Learning Path in Cisco U., free through July 8, 2024, during Rev Up to Recert: Nexus Dashboard.
![](/sites/default/files/styles/narrow_1x/public/feeds/20/squid-Stocktrek-images-alamy.jpg.webp?itok=U2mZxJsA)
2024. máj. 31.
Biztonsági szemle
LilacSquid APT Employs Open Source Tools, QuasarRAT
The previously unknown threat actor uses tools similar to those used by North Korean APT groups, according to Cisco Talos.
![](/sites/default/files/styles/narrow_1x/public/feeds/94/strategy-PhotoEdit-Alamy.jpg.webp?itok=R13BXj_o)
2024. máj. 31.
Biztonsági szemle
CISO Corner: Federal Cyber Deadlines Loom; Private Chatbot Danger
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included: fighting cybersecurity burnout; BlackSuit ransomware; the SEC breach rules and risk management.
Oldalszámozás
- Előző oldal ‹‹
- 106. oldal
- Következő oldal ››