Biztonsági szemle

2025. Aug. 21.
Biztonsági szemle
Tree of AST: A Bug-Hunting Framework Powered by LLMs
Teenaged security researchers Sasha Zyuzin and Ruikai Peng discuss how their new vulnerability discovery framework leverages LLMs to address limitations of the past.

2025. Aug. 21.
Biztonsági szemle
Prepping the Front Line for MFA Social Engineering Attacks
Attackers will continue to evolve, and the help desk will always be a target. But with the right mix of training, support, and trust, frontline agents can become your biggest security assets.

2025. Aug. 21.
Biztonsági szemle
Tailing Hackers, Columbia University Uses Logging to Improve Security
Logging netflows provided valuable insight about attacker tactics during a breach by state-sponsored hackers targeting Columbia's research labs.

2025. Aug. 21.
Biztonsági szemle
DARPA: Closing the Open Source Security Gap With AI
DARPA's Kathleen Fisher discusses the AI Cyber Challenge at DEF CON 33, and the results that proved how automation can help patch vulnerabilities at scale.

2025. Aug. 21.
Biztonsági szemle
Don't Forget The "-n" Command Line Switch, (Thu, Aug 21st)
A lot of people like the command line, the CLI, the shell (name it as you want) because it provides a lot of powerful tools to perform investigations. The best example is probably parsing logs! Even if we have SIEM to ingest and process them, many...

2025. Aug. 21.
Biztonsági szemle
Hacktivist Tied to Multiple Cyber Groups Sentenced to Jail
At one point, Al-Tahery Al-Mashriky was hacking thousands of websites within the span of three months while stealing personal data and sensitive information.

2025. Aug. 21.
Biztonsági szemle
ISC Stormcast For Thursday, August 21st, 2025 https://isc.sans.edu/podcastdetail/9580, (Thu, Aug 21st)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

2025. Aug. 21.
Biztonsági szemle
DPRK, China Suspected in South Korean Embassy Attacks
Detailed spear-phishing emails sent to European government entities in Seoul are being tied to North Korea, China, or both.

2025. Aug. 21.
Biztonsági szemle
Microsoft Lays Out its Quantum-Safe Plans
The goal of the Quantum-Safe Program is to ensure that by 2033, all Microsoft products and services are safe by default from quantum-based attacks.

2025. Aug. 20.
Biztonsági szemle
Building a Scalable E-Commerce Platform at Cisco: From DevNet to Company-Wide Impact
Executive Summary What began as a DevNet-led initiative to enable secure, compliant e-commerce for DevNet certification collateral and preparation materials has since evolved into a foundational framework benefiting Cisco at large. Over two years...

2025. Aug. 20.
Biztonsági szemle
Fake Employees Pose Real Security Risks
The security risks posed by fake employees are particularly severe when they secure IT positions with privileged access and administrative permissions.

2025. Aug. 20.
Biztonsági szemle
Critical SAP Vulns Under Exploitation in 'One-Two Punch' Attack
The vulnerabilities themselves aren't new, but are being exploited in a novel manner that could lead to a "devastating attack."
Oldalszámozás
- Előző oldal ‹‹
- 14. oldal
- Következő oldal ››