Biztonsági szemle
2026. március 25.
Biztonsági szemle
At RSAC, the EU Leads While US Officials Are Sidelined
While US government sits out this year, EU officials are on the ground in San Francisco leading the conversations on today's top cybersecurity challenges.
2026. március 25.
Biztonsági szemle
Responsible AI in Healthcare Starts with a Unified Edge Ecosystem
Healthcare organizations can leverage edge AI solutions to streamline clinical workflows and assist in the protection of sensitive data, empowering clinicians to focus on patient care while striving for improved operational efficiency.
2026. március 25.
Biztonsági szemle
Blame Game: Why Public Cyber Attribution Carries Risks
Publicly accusing an entity of a cyberattack could have negative consequences that organizations should consider before taking the plunge.
2026. március 25.
Biztonsági szemle
Phishers Pose as Palo Alto Networks' Recruiters for Months in Job Scam
A series of campaigns that began in August aim to defraud job candidates, using psychological tactics and data scraped from LinkedIn profiles.
2026. március 25.
Biztonsági szemle
High camera deployment costs? Not with Cisco
Learn more about how the Cisco MV44X dual-imager camera can help build a more sustainable, scalable network with simple deployment.
2026. március 25.
Biztonsági szemle
SANS: Top 5 Most Dangerous New Attack Techniques to Watch
For the first time, SANS Institute's five top attack techniques all have one thing in common – AI.
2026. március 25.
Biztonsági szemle
Why a 'Near Miss' Database Is Key to Improving Information Sharing
Organizations disclose attack details, though information may be limited, following a breach, but what if they did the same with close calls?
2026. március 25.
Biztonsági szemle
CVE-2026-3591: A stack use-after-return flaw in SIG(0) handling code may enable ACL bypass
CVE: CVE-2026-3591 Title: A stack use-after-return flaw in SIG(0) handling code may enable ACL bypass Document version: 2.0 Posting date: 25 March 2026 Program impacted: BIND 9 Versions affected: BIND 9.20.0 -> 9.20.20 9.21.0 -> 9.21.19 BIND...
2026. március 25.
Biztonsági szemle
CVE-2026-3119: Authenticated query containing a TKEY record may cause named to terminate unexpectedly
CVE: CVE-2026-3119 Title: Authenticated query containing a TKEY record may cause named to terminate unexpectedly Document version: 2.0 Posting date: 25 March 2026 Program impacted: BIND 9 Versions affected: BIND 9.20.0 -> 9.20.20 9.21.0 -> 9.21.19...
2026. március 25.
Biztonsági szemle
CVE-2026-3104: Memory leak in code preparing DNSSEC proofs of non-existence
CVE: CVE-2026-3104 Title: Memory leak in code preparing DNSSEC proofs of non-existence Document version: 2.0 Posting date: 25 March 2026 Program impacted: BIND 9 Versions affected: BIND 9.20.0 -> 9.20.20 9.21.0 -> 9.21.19 BIND Supported Preview...
2026. március 25.
Biztonsági szemle
CVE-2026-1519: Excessive NSEC3 iterations cause high CPU load during insecure delegation validation
CVE: CVE-2026-1519 Title: Excessive NSEC3 iterations cause high CPU load during insecure delegation validation Document version: 2.0 Posting date: 25 March 2026 Program impacted: BIND 9 Versions affected: BIND 9.11.0 -> 9.16.50 9.18.0 -> 9.18.46 9.20...
2026. március 25.
Biztonsági szemle
AI-Native Security Is a Must to Counter AI-Based Attacks
Attacks by artificial intelligence agents are a reality. Experts at Nvidia's GTC conference say defenders need to use the same tools to fight them off.
Oldalszámozás
- Előző oldal ‹‹
- 35. oldal
- Következő oldal ››