Biztonsági szemle
![](/sites/default/files/styles/narrow_1x/public/feeds/77/Eco-Data-Center-featured-scaled.jpeg.webp?itok=hC5ts1mg)
2024. ápr. 26.
Biztonsági szemle
Experience Eco-Friendly Data Center Efficiency with Cisco’s Unified Computing System (UCS)
Learn how Cisco's Unified Computing System (UCS) helps you stand at the forefront of data center energy-saving with attributes and design innovations essential for fostering sustainable development and maximizing operational efficiency and...
![Featured image for {“vendor”:”ppworks”,”type”:”segment”,”id”:”12591″} podcast from PPWorks](/sites/default/files/styles/narrow_1x/public/feeds/3d/SWN_381_8e96df22-0c76-4487-88e6-66a22a04f41f.jpg.webp?itok=nI_YDBJ3)
2024. ápr. 26.
Biztonsági szemle
TikTok, Flowmon, Cisco, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland - SWN #381
![](/sites/default/files/styles/narrow_1x/public/feeds/12/230130_Broadband_Subscriber_Blog_Feature.png.webp?itok=CW_rohWX)
2024. ápr. 26.
Biztonsági szemle
Evolving Broadband Networks with Cisco Subscriber Edge
Bridging the digital divide requires scalable infrastructure to deliver affordable services for everyone. Our Cisco Subscriber Edge solution simplifies the broadband network architecture with a distributed data plane and cloud-native control plane to...
![](/sites/default/files/styles/narrow_1x/public/feeds/6c/ArtemisDiana-software-components-shutterstock.jpg.webp?itok=bmNV_ViF)
2024. ápr. 26.
Biztonsági szemle
Cyberattack Gold: SBOMs Offer an Easy Census of Vulnerable Software
Attackers will likely use software bills-of-material (SBOMs) for searching for software potentially vulnerable to specific software flaws.
![AI(Artificial intelligence) concept.](/sites/default/files/styles/narrow_1x/public/feeds/4b/1127_artificial_intelligence.jpg.webp?itok=xkoMkSHL)
2024. ápr. 26.
Biztonsági szemle
AI sparks increasing cyber concerns for execs amid growing adoption
Twenty percent of cybersecurity officers across the UK cited artificial intelligence as their organizations' most significant cybersecurity threat, according to TechRadar.
![](/sites/default/files/styles/narrow_1x/public/feeds/71/CISA-alert.jpg.webp?itok=oMES1Va5)
2024. ápr. 26.
Biztonsági szemle
Updated CISA exploited vulnerabilties catalog includes Windows print spooler bug
Attacks by Russian threat operation APT28, also known as Fancy Bear, Strontium, and Forest Blizzard, using the GooseEgg malware to exploit the Windows print spooler flaw, tracked as CVE-2022-38028, have prompted the security issue's inclusion to the...
![](/sites/default/files/styles/narrow_1x/public/feeds/b4/Risk_Emre_Akkoyun_Alamy.jpg.webp?itok=J-zl9bX9)
2024. ápr. 26.
Biztonsági szemle
Minimum Viable Compliance: What You Should Care About and Why
Understand what security measures you have in place, what you need to keep secure, and what rules you have to show compliance with.
![Water drop](/sites/default/files/styles/narrow_1x/public/feeds/62/041524_water_drop.jpg.webp?itok=2u6W6g4Z)
2024. ápr. 26.
Biztonsági szemle
More details on rural water system breach sought by legislators
U.S. Department of Homeland Security Secretary Alejandro Mayorkas has been urged by Reps. Ruben Gallego, D-Ariz., and Pat Fallon, R-Texas, to provide more information regarding the January cyberattack against a water treatment plant in Muleshoe...
![](/sites/default/files/styles/narrow_1x/public/feeds/37/tank-Yuriy_Tuchkov-Alamy.jpg.webp?itok=-3LIP05t)
2024. ápr. 26.
Biztonsági szemle
Military Tank Manual, 2017 Zero-Day Anchor Latest Ukraine Cyberattack
The targeted operation utilized CVE-2017-8570 as the initial vector and employed a notable custom loader for Cobalt Strike, yet attribution to any known threat actor remains elusive.
![AI and Email](/sites/default/files/styles/narrow_1x/public/feeds/a7/032824_phishing_email.jpg.webp?itok=BYwKHsZS)
2024. ápr. 26.
Biztonsági szemle
Phishing attack compromises LA County Health Services data
Individuals receiving healthcare across Los Angeles had their personal and health data compromised following a successful phishing attack against Los Angeles County Department of Health Services, which is the second largest U.S. public healthcare...
![Trojan malware](/sites/default/files/styles/narrow_1x/public/feeds/04/0927_trojan_malware.jpg.webp?itok=oV4T_oXZ)
2024. ápr. 26.
Biztonsági szemle
Android device hijacking facilitated by new Brokewell banking trojan
BleepingComputer reports that Android devices could have their data compromised and be eventually hijacked in attacks with the novel Brokewell banking trojan.
![A computer screen displays a digital alert of an email phishing threat, accompanied by a striking red warning sign.](/sites/default/files/styles/narrow_1x/public/feeds/4a/022724_phishing.jpg.webp?itok=l983R0Td)
2024. ápr. 26.
Biztonsági szemle
Microsoft credentials targeted by phishing campaign using Autodesk Drive
Hacked email accounts have been used by threat actors to facilitate a phishing campaign that involves the use of Autodesk Drive-hosted PDF documents to compromise Microsoft account credentials, SecurityWeek reports.
Oldalszámozás
- Előző oldal ‹‹
- 193. oldal
- Következő oldal ››