Biztonsági szemle
2025. Júl. 15.
Biztonsági szemle
Lessons Learned From McDonald's Big AI Flub
McDonald's hiring platform was using its original default credentials and inadvertently exposed information belonging to approximately 64 million job applicants.
2025. Júl. 15.
Biztonsági szemle
AI Is Reshaping How Attorneys Practice Law
Experts recommend enhanced AI literacy, training around the ethics of using AI, and verification protocols to maintain credibility in an increasingly AI-influenced courtroom.
2025. Júl. 15.
Biztonsági szemle
AsyncRAT Spawns Concerning Labyrinth of Forks
Since surfacing on GitHub in 2019, AsyncRAT has become a poster child for how open source malware can democratize cybercrime, with a mazelike footprint of variants available across the spectrum of functionality.
2025. Júl. 15.
Biztonsági szemle
Leading Through Change: How Cisco DevNet Engineering Sustained Excellence Amid Disruption
Purpose and What to Expect from this Blog Cisco DevNet Engineering underwent one of the most disruptive periods in its history in the past year. Facing leadership transitions, organizational realignment, and consequential Limited restructuring (LR)...
2025. Júl. 15.
Biztonsági szemle
Attackers Abuse AWS Cloud to Target Southeast Asian Governments
The intelligence-gathering cyber campaign introduces the novel HazyBeacon backdoor and uses legitimate cloud communication channels for command-and-control (C2) and exfiltration to hide its malicious activities.
2025. Júl. 15.
Biztonsági szemle
5 Ways Wi-Fi 7 Elevates the Guest Experience with Smart Hospitality
Discover how Wi-Fi 7 revolutionizes hospitality with seamless, high-speed connectivity, powering smart devices and enhancing guest experiences with Cisco solutions.
2025. Júl. 15.
Biztonsági szemle
Public Sector Highlights: Key Takeaways and Success Stories from Cisco Live US 2025
Explore how public sector organizations are accelerating innovation, security, and sustainability with the top three takeaways from Cisco Live US 2025.
2025. Júl. 15.
Biztonsági szemle
How Criminal Networks Exploit Insider Vulnerabilities
Criminal networks are adapting quickly, and they're betting that companies won't keep pace. Let's prove them wrong.
2025. Júl. 15.
Biztonsági szemle
MITRE Launches AADAPT Framework for Financial Systems
The new framework is modeled after and meant to complement the MITRE ATT&CK framework, and it is aimed at detecting and responding to cyberattacks on cryptocurrency assets and other financial targets.
2025. Júl. 15.
Biztonsági szemle
Universal ZTNA from Cisco Earns Coveted SE Labs AAA Rating
Combining the power of Duo's Identity Management and Cisco's Secure Access and Identity Intelligence protects against stolen credentials and phishing attacks.
2025. Júl. 15.
Biztonsági szemle
Keylogger Data Stored in an ADS, (Tue, Jul 15th)
If many malware samples try to be "filess" (read: they try to reduce their filesystem footprint to the bare minimum), another technique remains interesting: Alternate Data Streams or "ADS"[ 1]. This NTFS feature allows files to contain multiple data...
2025. Júl. 15.
Biztonsági szemle
ISC Stormcast For Tuesday, July 15th, 2025 https://isc.sans.edu/podcastdetail/9526, (Tue, Jul 15th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Oldalszámozás
- Előző oldal ‹‹
- 81. oldal
- Következő oldal ››