Biztonsági szemle
2026. február 18.
Biztonsági szemle
Scam Abuses Gemini Chatbots to Convince People to Buy Fake Crypto
A convincing presale site for phony "Google Coin" features an AI assistant that engages victims with a slick sales pitch, funneling payment to attackers.
2026. február 18.
Biztonsági szemle
Critical Grandstream VoIP Bug Highlights SMB Security Blind Spot
CVE-2026-2329 allows unauthenticated root-level access to SMB phone infrastructure, so attackers can intercept calls, commit toll fraud, and impersonate users.
2026. február 18.
Biztonsági szemle
Threat Intelligence Has a Human-Shaped Blind Spot
How I realized what I was taught to about threat intelligence was missing something crucial.
2026. február 18.
Biztonsági szemle
Dell's Hard-Coded Flaw: A Nation-State Goldmine
A China-related attacker has exploited the vendor flaw since mid-2024, allowing it to move laterally, maintain persistent access, and deploy malware.
2026. február 18.
Biztonsági szemle
A CISO's Playbook for Defending Data Assets Against AI Scraping
Discover a strategic approach to govern scraping risks, balance security with business growth, and safeguard intellectual capital from automated data harvesting.
2026. február 18.
Biztonsági szemle
New AI repos catalog at Cisco DevNet Code Exchange
Now you can discover MCP servers and AI Agents related to Cisco technologies https://developer.cisco.com/codeexchange/ai/. In Code Exchange, with thousands of code repositories, you can find examples… Read more on Cisco Blogs
2026. február 18.
Biztonsági szemle
Unifying the data center with Cisco Nexus One: The network that works for you
Looking for the future of data center networking? Guest analyst Scott Raynovich of Futuriom uncovers how Cisco Nexus One delivers game-changing unification and flexibility. Read his expert insights in the full blog.
2026. február 18.
Biztonsági szemle
Why post-quantum cryptography matters for securing campus and branch networks
As quantum computing continues to rapidly advance, it will enable "harvest now, decrypt later" attacks, allowing adversaries to collect currently encrypted private data for future decryption. Campus and branch networks will become critical attack...
2026. február 18.
Biztonsági szemle
Singapore & Its 4 Major Telcos Fend Off Chinese Hackers
After detecting a zero-day attack, the country's effective response was attributed to the tight relationship between its government and private industry.
2026. február 17.
Biztonsági szemle
Supply Chain Attack Embeds Malware in Android Devices
Keenadu downloads payloads that hijack browser searches, commit ad fraud, and execute other actions without user knowledge.
2026. február 17.
Biztonsági szemle
Rethinking Global Data Strategies: Insights from Cisco’s 2026 Privacy Benchmark Survey
Every time you join a video call, use a cloud app, or interact with an AI tool, your data is likely crossing borders. But that’s not unusual. It’s how the modern digital economy works. However, as da… Read more on Cisco Blogs
2026. február 17.
Biztonsági szemle
Poland Energy Survives Attack on Wind, Solar Infrastructure
Russia-aligned groups are probable culprits behind the wiper attacks against renewable energy farms, a manufacturer, and a heating and power plant.
Oldalszámozás
- Előző oldal ‹‹
- 54. oldal
- Következő oldal ››