Biztonsági szemle
2025. Szep. 17.
Biztonsági szemle
The Cloud Edge Is The New Attack Surface
The cloud now acts as the connecting infrastructure for many companies' assets — from IoT devices to workstations to applications and workloads — exposing the edge to threats.
2025. Szep. 17.
Biztonsági szemle
Microsoft Disrupts 'RaccoonO365' Phishing Service
Phishing-as-a-service (PhaaS) kits have become an increasingly popular way for lower-skill individuals who want to get into cybercrime.
2025. Szep. 17.
Biztonsági szemle
'Scattered Lapsus$ Hunters,' Others Announce End of Hacking Spree
Though the groups have shared their decision to go dark, threat researchers say there are signs that it's business as usual.
2025. Szep. 17.
Biztonsági szemle
Composable Infrastructure: What It Means in the AI Era
AI is reshaping infrastructure demands—and traditional infrastructure can’t keep up. Discover how Cisco UCS X-Series with X-Fabric Technology 2.0 delivers true composability, unlocking scalable, GPU-accelerated performance for the AI era.
2025. Szep. 17.
Biztonsági szemle
Fusing Security into Networks: The Next Evolution in Enterprise Protection
Today’s networks are dynamic, distributed, and constantly under attack—making traditional, bolt-on security tools insufficient. Cisco® AI-Ready Secure Network Architecture embeds multilayered secu… Read more on Cisco Blogs
2025. Szep. 17.
Biztonsági szemle
AI-Powered Sign-up Fraud Is Scaling Fast
The AI era means attackers are smarter, faster, and hitting you where you least expect it — your sign-up funnel.
2025. Szep. 17.
Biztonsági szemle
Raven Stealer Scavenges Chromium Data Via Telegram
The new lightweight stealer, distributed via underground forums and cracked software, demonstrates an important evolution in the stealth of commodity infostealing malware.
2025. Szep. 17.
Biztonsági szemle
CTRL-Z DLL Hooking, (Wed, Sep 17th)
When you're debugging a malware sample, you probably run it into a debugger and define some breakpoints. The idea is to take over the program control before it will perform âinterestingâ actions. Usually, we set breakpoints on memory...
2025. Szep. 17.
Biztonsági szemle
ISC Stormcast For Wednesday, September 17th, 2025 https://isc.sans.edu/podcastdetail/9616, (Wed, Sep 17th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2025. Szep. 17.
Biztonsági szemle
North Korean Group Targets South With Military ID Deepfakes
The North Korea-linked group Kimsuky used ChatGPT to create deepfakes of military ID documents in an attempt to compromise South Korean targets.
2025. Szep. 16.
Biztonsági szemle
Ray Security Takes an Active Data Security Approach
A data security platform based on action is what the industry needs right now to protect enterprise data.
2025. Szep. 16.
Biztonsági szemle
Unlock Unified Network and Security Analytics with Cisco and Splunk
As we continue our video series — NetGru: Month of Networking — we’ll show you how to unlock unified network and security analytics with the Cisco Enterprise Networking app for Splunk. Hosted by Principal Engineer Adrian Illiesiu, this weekly...
Oldalszámozás
- Előző oldal ‹‹
- 33. oldal
- Következő oldal ››