Spain to vet power plants’ cybersecurity for ‘great blackout’ cause
The Spanish government has yet to determine the specific causes of the blackout that left the country without power for an entire day on April 28. Discovering the cause, as Prime Minister Pedro...
View ArticleMarks & Spencer räumt Datendiebstahl ein
Der britische Retail-Riese Marks & Spencer wurde von Cyberkriminellen heimgesucht und kämpft nun mit den Folgen.WD Stock Photos | shutterstock.com Wie Marks & Spencer (M&S) im Rahmen eines...
View ArticleCISA adds the notorious TeleMessage flaw to KEV list
CISA has added a medium-severity vulnerability discovered in TeleMessage TM SGNL, the messaging application that was used by the former national security advisor Mike Waltz, to its Known Exploited...
View ArticleNeue EU-Schwachstellen-Datenbank geht an den Start
Die neue EU-Schwachstellen-Datenbank EUVD soll das CVE-Programm ergänzen.artjazz – shutterstock.com Seit dieser Woche verfügt die Technologiebranche über eine neue Datenbank, um die neuesten...
View ArticleIvanti patches two EPMM flaws exploited in the wild
IT software company Ivanti released emergency patches for its enterprise mobile device management (MDM) solution after learning of in-the-wild attacks exploiting two previously unknown...
View ArticleDie acht wichtigsten Sicherheitsmetriken
Je schneller Schwachstellen entdeckt werden, desto geringer der Schaden. Das zahlt sich für alle aus. Pressmaster – shutterstock.com Kennzahlen und Metriken wie KPIs sind essenziell, um die...
View ArticleHow phones get hacked: 7 common attack methods explained
The smartphone revolution was supposed to provide a second chance for the tech industry to roll out a secure computing platform. These new devices were purported to be locked down and immune to...
View ArticleHacker nehmen Rüstungslieferanten der Ukraine ins Visier
Russische Hacker greifen gezielt Rüstungsfirmen an, die die Ukraine mit Waffen versorgen.PeopleImages.com – Yuri A – Shutterstock.com Die berüchtigte russische Hackergruppe Fancy Bear hat gezielt...
View Article‘Aggressive, creative’ hackers behind UK breaches now eyeing US retailers
Google has warned that a hacking group linked to “Scattered Spider,” which is believed to be behind the attack on UK retailer Marks & Spencer (M&S), is now targeting similar companies in the...
View ArticleThe most effective phishing QR code is a new drug and alcohol policy...
Phishing emails that appear to be internal and come from the IT or HR department are the emails that trick the most users, according to KnowBe4’s Q1 2025 Phishing Report. Over 60% of emails that...
View ArticleData on sale: Trump administration withdraws data broker oversight proposal
The US Consumer Financial Protection Bureau has withdrawn a proposed rule that would have restricted data brokers from selling US citizens’ personal and financial information. The decision,...
View ArticleAlternatives to Microsoft Outlook webmail come under attack in Europe
CISOs need to ensure that web email clients and browsers are kept up to date following the discovery of cross site scripting attacks on organizations running webmail clients such as Roundcube, Horde,...
View ArticleStealth RAT uses a PowerShell loader for fileless attacks
>Threat actors have been spotted using a PowerShell-based shellcode loader to stealthily deploy Remcos RAT, a popular espionage-ready tool in line with a broader shift toward fileless techniques.As...
View ArticleGoogle patches Chrome vulnerability used for account takeover and MFA bypass
Chrome users are advised to update their browser immediately to fix a critical vulnerability that is being exploited to launch account takeover attacks. In some environments, this could even give...
View ArticleAfter helping Russia on the ground North Korea targets Ukraine with...
North Korea’s involvement in the war in Ukraine extends beyond sending soldiers, munitions, and missiles to Russia, as cybersecurity researchers warn of recent cyberespionage campaigns against...
View ArticleProofpoint buying Hornetsecurity in a play to expand email security scope
More than of 90% of successful cyberattacks begin with emails, according to the US Cybersecurity and Infrastructure Security Agency (CISA), making them a critical asset that enterprises must protect....
View ArticleDie besten IAM-Tools
Identity & Access Management ist für sicherheitsbewusste Unternehmen im Zero-Trust-Zeitalter Pflicht. Das sind die besten IAM-Anbieter und -Tools. Foto: ne2pi – shutterstock.comIdentität wird zum...
View ArticleHacker stehlen BVG-Kundendaten
Kunden der Berliner Verkehrsbetriebe (BVG) sind von einer Datenpanne betroffen.Media centre BVG Die Berliner Verkehrsbetriebe (BVG) haben ihre Kunden kürzlich über ein Datenleck informiert. Wie eine...
View ArticleHow to establish an effective AI GRC framework
Enterprise use of artificial intelligence comes with a wide range of risks in areas such as cybersecurity, data privacy, bias and discrimination, ethics, and regulatory compliance. As such,...
View Article‘Would rather pay bounty than ransom’: Coinbase on $20M extortion attempt
Coinbase (Nasdaq:COIN), the largest crypto exchange in the US, is offering a $20 million bounty for information leading to those behind a May 2025 breach that compromised customer data. In a Wednesday...
View Article