Skip to content
31. January 2026
Newsletter
Random News

KrofekSecurity

  • KrofekAI
  • KrofekIT
Headlines
  • "Discover the hidden threats lurking in the digital world with this enticing image featuring small donuts hidden in the background. Just like these delicious treats, vulnerabilities can be hidden from plain sight, waiting to be uncovered. Let this image spark your curiosity and prompt you to learn more about the security measures needed to protect against these hidden dangers. Dive into the world of IT security news and uncover the secrets that can keep your digital assets safe."
    8 hours ago

    Overview of Vulnerability CVE-2024-12171 and Related Security Measures

  • An engaging image for a blog post on IT security news, featuring a background with hidden small donuts scattered throughout. The focus is on cybersecurity, incorporating symbols and visuals representing data protection and online safety.
    1 day ago

    Vulnerability Overview – CVE-2025-24891: Dumb Drop Root File Overwrite Vulnerability

  • A sleek and modern image of a computer screen displaying a complex coding interface, symbolizing IT security news. Hidden amongst the lines of code are tiny donuts, adding a quirky element to the serious topic of cybersecurity.
    2 days ago

    TeamCal Neo SQL Injection Vulnerability: CVE-2025-0929 Summary and Protection Measures

  • ALT text: A high-tech cybersecurity network with data analysis protection measures in place, featuring hidden donuts symbolizing the reward of secure systems. Stay informed on IT security news to protect your network effectively.
    3 days ago

    Data Analysis and Protection Information: GFI Kerio Control Vulnerability and Latest Manufacturer’s Vulnerabilities

  • An illustration of a high-tech digital landscape with coding and data streams, with hidden donuts symbolizing cybersecurity vulnerabilities waiting to be discovered. Stay vigilant and informed with the latest cybersecurity news and updates.
    4 days ago

    Cybersecurity Update: Summary of Vulnerability CVE-2025-0493

  • A digital shield with a lock icon in the center, overlaying a network background with hidden donuts scattered throughout. This image represents the critical role of protecting data and defending against IT security threats.
    5 days ago

    Data Analysis and Protection Information: Defending Against Emerging Vulnerabilities

  • Uncategorized

Cisco’s WebEx Chrome vtičnik vam bo naložil zlonamerno kodo

admin9 years ago01 mins

Cisco’s WebEx Chrome vtičnik vam bo naložil zlonamerno kodo, namestil malware preko ‘magic URL’. [urlpreviewbox url=”http://www.theregister.co.uk/2017/01/23/webex_hid_url_for_remote_command_execution/”/]

Read More
  • Poročilo

Proročilo: Stanje Application Delivery 2017

admin9 years ago01 mins

Kakšna je vaša raven zaupanja, da boste vzdržali napad? Raziščite varnostne trende in si preberite sledeče poročilo. [urlpreviewbox url=”https://f5.com/about-us/news/the-state-of-application-delivery?utm_source=LI&utm_medium=F5&utm_campaign=SOAD2017&sf52312734=1″/]

Read More
  • Gartner Magic Quadrant

Trend Micro TippingPoint je imenovan za vodilnega v Gartnerju 2017

admin9 years ago01 mins

Trend Micro pred letom prevzel TippingPoint (Intrusion Detection and Prevention Systems) in že nasljednje leto je TippingPoint imenovan za vodilnega v Gartnerju.   [urlpreviewbox url=”http://blog.trendmicro.com/trend-micro-tippingpoint-named-a-leader-in-2017-gartner-magic-quadrant-for-intrusion-detection-and-prevention-systems-idps/?linkId=33622233″/]

Read More
  • Varnostne luknje

Spletna stran McDonald’s ima gesla spravljena v nekodirani obliki

admin9 years ago01 mins

Varnostni raziskovalec Tijme Gommers je odkril in javno objavil, način ki na uradni strani McDonald’s omogoča napadalcu dostop do gesla uporabnika v obliki besedila. [urlpreviewbox url=”https://www.bleepingcomputer.com/news/security/mcdonalds-official-website-exposes-passwords-in-cleartext/?es_p=3439855″/]

Read More
  • Članki

EyePyramid – malware uporabljen v vdorih v Italiji

admin9 years ago01 mins

Prejšnji torek, sta bila aretirana dva Italijanska državljana, s strani Italijanskih organov (v sodelovanju z FBI) za krajo občutljivih podatkov. Tarča napadov so bili tako navadni državljani, kakor javne osebe,…

Read More
  • Članki

Ransomware: Kako težave v varnosti postanejo največja nevarnost

admin9 years ago01 mins

[urlpreviewbox url=”http://www.darkreading.com/endpoint/ransomware-how-a-security-inconvenience-became-the-industrys-most-feared-vulnerability/a/d-id/1327873?utm_content=buffer1d32f&utm_medium=social&utm_source=linkedin.com&utm_campaign=buffer”/]

Read More
  • Uncategorized

EyePiramid uporabljna za krajo več kakor 87 GB podatkov

admin9 years ago01 mins
Read More
  • Varnostne luknje

WhatsApp ranljivost omogoča vohanje na šifriranih sporočilih

admin9 years ago01 mins

Varnostna luknja, ki omogoča da na Facebook prestežejo in berejo šifrirana sporočila, je  bila najdena tudi v WhatsApp. [urlpreviewbox url=”https://www.theguardian.com/technology/2017/jan/13/whatsapp-backdoor-allows-snooping-on-encrypted-messages”/]

Read More
  • 1
  • …
  • 124
  • 125
  • 126

Upcoming Webinar

Notice
There are no upcoming events.

F5 - last articles

F5 Networks
Kako zagotoviti informacijsko varnost s tehnično podporo F5 Networks?
F5 Networks
Kubernetes arhitekturne moznosti s F5 distribuiranimi oblaki – Vse kar morate vedeti
F5 Networks
Učinkovite kibernetske varnostne rešitve za SaaS-based storitve.
F5 Networks
F5: vodilni igralec v upravljanju aplikacij in varnosti

Broadcom security - last articles

Symantec
Varnost e-pošte: Najnovejši sevarnostni trendi in poslovni zahteve
Symantec
AppNeta vs. ThousandEyes: Podrobna Primerjava
Symantec
Kako AppNeta pomaga pri skladnosti z NIS2 direktivo
Symantec
Symantec Automic – Zmogljiva rešitev za avtomatizacijo poslovnih procesov

Crowdstrike - last articles

Crowdstrike
Kako Se Zaščititi Pred Spletnimi Grožnjami: Vodnik za Učinkovito Cyber Sigurnost in Zavarovanje
Crowdstrike
Najnovejše novice o kibernetski varnosti: Vodilna vloga CrowdStrike v razvoju kibernetske varnostne platforme
Crowdstrike
Zakaj je CrowdStrike Falcon LogScale nova generacija SIEM rešitev
Crowdstrike
Zakaj stranke izbirajo CrowdStrike pred SentinelOne

Infoblox - last articles

Infoblox
Zagotovitev varnosti omrežja s pametno uporabo DHCP storitev in IPv6_PROTOCOL v IT industriji.
Infoblox
Kako izboljšati Cyber varnost z učinkovitim upravljanjem DNS in IP naslovov
Infoblox
Infoblox vs. Netbox: Zakaj je Infoblox kralj upravljanja IP naslovov?
Infoblox
Zaščita prihodnosti: Kako BloxOne® Threat Defense ščiti IoT naprave pred kibernetskimi grožnjami

Entrust - last articles

Entrust
– Zagotavljanje varnosti kritične infrastrukture in nadzorovanje OT omrežij.
Entrust
Nadzorovanje in varnost OT omrežja – ključni vidiki za vašo spletno varnost.
Entrust
Kako Učinkovito Uporabljati SSL Certifikate za Upravljanje Cyber Varnosti
Entrust
F5 Networks
Integracija F5 BIG-IP in Entrust nShield HSM za varno upravljanje kriptografskih ključev

Gigamon - last articles

Gigamon
Kriptografija in varnost podatkov v oblaku: ključni ukrepi za vašo IT varnost.
Gigamon
Cyber-nadzor: Učinkovite metode za odkrivanje groženj v omrežju
Gigamon
Ali je Gigamon Deep Observability Pipeline primern za manjše podjetja
Gigamon
Transformacija omrežja: Zakaj je GigaVUE Cloud Suite nepogrešljiv za sodobna podjetja
KrofekSecurity by 4secnet and Krofek.net Powered By BlazeThemes.