Biztonsági szemle
2025. december 11.
Biztonsági szemle
Building AI You Can Trust for Network Troubleshooting with Deep Network Solutions
AI is transforming network troubleshooting, but trust is critical. In part two of our series, discover how Deep Network Troubleshooting combines verified knowledge, advanced reasoning, and human oversight to deliver automation you can rely on.
2025. december 11.
Biztonsági szemle
The Power of Listening: Building Community through Co-Design
Discover how the Cisco 360 Partner Program was built through deep listening, co-design, and collaboration with partners, fostering a stronger, more committed community and transforming relationships.
2025. december 11.
Biztonsági szemle
From Passive to Purpose-Built: Why Your Edge Strategy Needs a Refresh [GigaOm Webinar Insights]
The edge is transforming from a passive data collection point to an active, purpose-built infrastructure capable of real-time AI processing—75% of enterprise data will be created and processed there. In our recent webinar with GigaOm analyst Jon...
2025. december 11.
Biztonsági szemle
AI in OT Sparks Cascade of Complex Challenges
Using artificial intelligence in operational technology environments could be a bumpy ride full of trust issues and security challenges.
2025. december 11.
Biztonsági szemle
Agentic AI and the future of customer experience
Agentic CX isn’t coming, it’s here. The 2025 Cisco AI Readiness Index shows the tremendous potential and real challenges organizations face as they race to capture its power.
2025. december 11.
Biztonsági szemle
The Segmentation Cycle: A Practical Approach to Network Security
The segmentation journey starts with visibility, goes through identity context, policy and enforcement, ultimately returning to enhanced visibility.
2025. december 11.
Biztonsági szemle
Copilot's No-Code AI Agents Liable to Leak Company Data
Microsoft puts the power of AI in the hands of everyday non-technical Joes. It's a nice idea, and a surefire recipe for security issues.
2025. december 11.
Biztonsági szemle
Using AI Gemma 3 Locally with a Single CPU , (Wed, Dec 10th)
Several months ago, I got a Nucbox K8 Plus minicomputer to use as a Proxmox 9 server. At the time of this acquisition, I didn't realize this minicomputer had an artificial intelligence (AI) engine [ 1] build in the CPU that could be used to...
2025. december 11.
Biztonsági szemle
ISC Stormcast For Thursday, December 11th, 2025 https://isc.sans.edu/podcastdetail/9734, (Thu, Dec 11th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
2025. december 10.
Biztonsági szemle
Storm-0249 Abuses EDR Processes in Stealthy Attacks
The initial access broker has been weaponizing endpoint detection and response (EDR) platforms and Windows utilities in recent high-precision attacks.
2025. december 10.
Biztonsági szemle
ClickFix Style Attack Uses Grok, ChatGPT for Malware Delivery
A new twist on the social engineering tactic is making waves, combining SEO poisoning and legitimate AI domains to install malware on victims' computers.
2025. december 10.
Biztonsági szemle
Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection), (Wed, Dec 10th)
Last year, Kubernetes fixed a command injection vulnerability in the Kubernetes NodeLogQuery feature (%%cve:2024-9042%%) [1]. To exploit the vulnerability, several conditions had to be met:
Oldalszámozás
- Előző oldal ‹‹
- 89. oldal
- Következő oldal ››