Biztonsági szemle
2025. Júl. 11.
Biztonsági szemle
How Post-Quantum Cryptography Affects Security and Encryption Algorithms
The advent of quantum computing represents a fundamental shift in computational capabilities that threatens the cryptographic foundation of modern digital security. As quantum computers evolve from… Read more on Cisco Blogs
2025. Júl. 11.
Biztonsági szemle
Factoring Cybersecurity Into Finance's Digital Strategy
As financial institutions continue to embrace digital transformation, their success will depend on their ability to establish and maintain robust and responsible cybersecurity practices.
2025. Júl. 11.
Biztonsági szemle
Sajtószemle – 2025. 28. hét
A 2025. 28. hetére vonatkozó hírválogatás, amely az NBSZ NKI által 2025.07.04. és 2025.07.10. között kezelt incidensek statisztikai adatait is tartalmazza.
2025. Júl. 11.
Biztonsági szemle
ISC Stormcast For Friday, July 11th, 2025 https://isc.sans.edu/podcastdetail/9522, (Fri, Jul 11th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2025. Júl. 11.
Biztonsági szemle
Customer, Employee Data Exposed in Nippon Steel Breach
Information from the company's NS Solutions subsidiary has yet to show up on any Dark Web sites, but it doesn't rule out the possibility that the data may have been stolen.
2025. Júl. 10.
Biztonsági szemle
Digital Fingerprints Test Privacy Concerns in 2025
Digital fingerprinting technology creates detailed user profiles by combining device data with location and demographics, which increases the risks of surveillance.
2025. Júl. 10.
Biztonsági szemle
eSIM Bug in Millions of Phones Enables Spying, Takeover
eSIMs around the world may be fundamentally vulnerable to physical and network attacks because of a 6-year-old Oracle vulnerability in technology that underlies billions of cards.
2025. Júl. 10.
Biztonsági szemle
Ingram Micro Up and Running After Ransomware Attack
Customers were the first to notice the disruption on the distributor's website when they couldn't place orders online.
2025. Júl. 10.
Biztonsági szemle
Agentic AI's Risky MCP Backbone Opens Brand-New Attack Vectors
Critical security vulnerabilities affect different parts of the Model Context Protocol (MCP) ecosystem, which many organizations are rapidly adopting in order to integrate AI models with external data sources.
2025. Júl. 10.
Biztonsági szemle
4 Arrested in UK Over M&S, Co-op, Harrods Hacks
The UK's National Crime Agency arrested four people, who some experts believe are connected to the notorious cybercriminal collective known as Scattered Spider.
2025. Júl. 10.
Biztonsági szemle
Kea HA Strategies Comparison
Introduction Kea's High Availability hook is the recommended solution for high availability operation. The Kea HA hook works by pairing Kea servers (a multi-node solution is also available), in either an active-active or active-passive collaboration...
2025. Júl. 10.
Biztonsági szemle
Kea Shared Lease Database Quickstart
Introduction In some cases, administrators may want to configure Kea to use the "Shared Lease Database" High Availability method. This method has certain advantages when compared to the HA Hook. The advantages and disadvantages of each method are...
Oldalszámozás
- Előző oldal ‹‹
- 119. oldal
- Következő oldal ››