Biztonsági szemle
2025. Nov. 5.
Biztonsági szemle
Critical Site Takeover Flaw Affects 400K WordPress Sites
Attackers are already targeting a vulnerability in the Post SMTP plug-in that allows them to fully compromise an account and website for nefarious purposes.
2025. Nov. 5.
Biztonsági szemle
Death by a Thousand Prompts: Open Model Vulnerability Analysis
AI models have become increasingly democratized, and the proliferation and adoption of open weight models has contributed significantly to this reality. Open-weight models provide researchers,… Read more on Cisco Blogs
2025. Nov. 5.
Biztonsági szemle
Risk 'Comparable' to SolarWinds Incident Lurks in Popular Software Update Tool
Some of the world's biggest technology companies use a program liable to introduce malware into their software. The potential consequences are staggering, but there's an easy fix.
2025. Nov. 5.
Biztonsági szemle
Closing the AI Execution Gap in Cybersecurity — A CISO Framework
CISOs must navigate five critical dimensions of AI in cybersecurity: augmenting security with AI, automating security with AI, protecting AI systems, defending against AI-powered threats, and aligning AI strategies with business goals. Neglecting any...
2025. Nov. 5.
Biztonsági szemle
Elusive Iranian APT Phishes Influential US Policy Wonks
Iran is spying on American foreign policy influencers. But exactly which of its government's APTs is responsible remains a mystery.
2025. Nov. 5.
Biztonsági szemle
ISC Stormcast For Wednesday, November 5th, 2025 https://isc.sans.edu/podcastdetail/9686, (Wed, Nov 5th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2025. Nov. 5.
Biztonsági szemle
Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users
The well-known North Korean threat group continues to improve the obfuscation and anti-analysis features of its attack toolchain.
2025. Nov. 4.
Biztonsági szemle
AI App Spending Report: Where Are the Security Tools?
An analysis of startup firms' spending on AI applications finds the top categories to be productivity and content-generation. Security? Not so much.
2025. Nov. 4.
Biztonsági szemle
Pro-Russian Hackers Use Linux VMs to Hide in Windows
A threat actor known as "Curly COMrades" is using Linux VMs to remain undetected in Windows environments while conducting Russia-aligned activities.
2025. Nov. 4.
Biztonsági szemle
Inside the Playbook of Ransomware's Most Profitable Players
Successful ransomware groups have three key elements in common. Spoiler alert: indicators of success don't all revolve around artificial intelligence.
2025. Nov. 4.
Biztonsági szemle
Europe Sees Increase in Ransomware, Extortion Attacks
European organizations face an escalating cyber threat landscape as attackers leverage geopolitical tensions and AI-enhanced social engineering for attacks.
2025. Nov. 4.
Biztonsági szemle
When Partners Lead with AI, Everything Changes: Meet Cisco’s 2025 Partner Innovation Challenge Winners
Discover the groundbreaking AI solutions from the 2025 Cisco Partner Innovation Challenge Winners, who are redefining what's possible in student support, sustainable energy, retail optimization, and more. Learn how Cisco partners are leading with AI...
Oldalszámozás
- Előző oldal ‹‹
- 34. oldal
- Következő oldal ››