Biztonsági szemle

2025. Ápr. 28.
Biztonsági szemle
Inner workings of ToyMaker IAB examined
Initial access broker ToyMaker has been providing Cactus ransomware gang and other double extortion threat operations access to compromised systems, The Hacker News reports.

2025. Ápr. 28.
Biztonsági szemle
TikTok user database purportedly compromised, over 900K users' info exposed
TikTok had its user database claimed to have been stolen by the R00TK1T hacking collective, which has already posted a sample of credentials belonging to 972,000 users, according to GBHackers News.

2025. Ápr. 28.
Biztonsági szemle
AI, Automation, and Dark Web Fuel Evolving Threat Landscape
Attackers are leveraging the benefits of new technology and the availability of commodity tools, credentials, and other resources to develop sophisticated attacks more quickly than ever, putting defenders on their heels.

2025. Ápr. 28.
Biztonsági szemle
Defending Against HNDL Attacks Today
In the ever-evolving threat landscape of cybersecurity, HNDL (Harvest Now, Decrypt Later) is emerging as a silent but serious threat. You don't need a crystal ball to defend against future risks - you need a roadmap. Learn how organizations can act...

2025. Ápr. 28.
Biztonsági szemle
Forget the Stack; Focus on Control
Security teams are under more pressure than ever — and cybersecurity debt is adding fuel to the fire. While it can't be eliminated overnight, it can be managed.

2025. Ápr. 28.
Biztonsági szemle
Revolutionizing AI Security and Cyber Resilience with Open-Source Innovation and Risk Management Solutions
Open-source tools by Cisco's Foundation AI support the EU’s goals to foster collaboration and transparency in technology development. By encouraging the use of secure and ethical AI, Cisco’s initiatives contribute to the EU’s vision of a digital...

2025. Ápr. 28.
Biztonsági szemle
DoJ Data Security Program Highlights Data Sharing Challenges
The Department of Justice announced compliance rules for the Data Security Program that will require organizations to reexamine how they do business and with whom.

2025. Ápr. 28.
Biztonsági szemle
Reimagining Security for the AI Era
This week at RSA in San Francisco, we're launching an array of innovations aimed at helping enterprises equip their cybersecurity teams with the AI technology they need to keep their companies safe in the AI era.
2025. Ápr. 28.
Biztonsági szemle
CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-1976 Broadcom Brocade Fabric OS Code Injection Vulnerability CVE-2025-42599 Qualitia Active! Mail Stack-Based...

2025. Ápr. 28.
Biztonsági szemle
Innovative OT Security Solutions by Cisco at RSAC 2025
Join Cisco at RSAC 2025 where we’ll be demonstrating new capabilities in Industrial Threat Defense, including smarter OT vulnerability prioritization, adaptive zone segmentation using firewalls, and unified IT/OT threat detection to secure industrial...

2025. Ápr. 28.
Biztonsági szemle
BSides SF: Using AI to spot shadow patches in open-source software
An indisputable security use case for ChatGPT: scouring open-source changelogs for undisclosed vulnerability patches.

2025. Ápr. 28.
Biztonsági szemle
ISC Stormcast For Monday, April 28th, 2025 https://isc.sans.edu/podcastdetail/9426, (Mon, Apr 28th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Oldalszámozás
- Előző oldal ‹‹
- 123. oldal
- Következő oldal ››