Cyberangriff auf australische Fluggesellschaft Qantas
Die australische Fluggesellschaft Qantas ist Opfer einer Cyberattacke.Ryan Fletcher – shutterstock.com Die australische Fluggesellschaft Qantas ist Opfer eines Cyberangriffs geworden. Hacker hätten...
View ArticleWhy every company needs a travel security program
In today’s heightened geopolitical climate, business travel is no longer a routine operational necessity — it’s a strategic exposure. Whether you’re operating across six continents or sending one...
View ArticleScattered Spider shifts focus to airlines as strikes hit Hawaiian, WestJet —...
A data breach at Qantas via a third-party service is typical of the Scattered Spider attack group, experts say. “Qantas’ cyber breach bears the hallmarks of Scattered Spider, the same group behind...
View ArticleSecuring the next wave of workload identities in the cloud
It was a moment of realization for our mid-size law team. As we were constructing a new cloud-native analytics pipeline that spanned our private data center and public clouds, we found ourselves...
View ArticleCritical RCE flaw in Anthropic’s MCP inspector exposes developer machines to...
A critical remote code execution (RCE) bug in Anthropic’s Model Context Protocol (MCP) inspector tool could allow attackers to run arbitrary commands on developer machines when they visit a malicious...
View ArticleSecond espionage-linked cyberattack hits ICC, exposing persistent threats to...
The International Criminal Court (ICC) has fallen victim to another sophisticated cyberattack, the second major cyber espionage attempt targeting the war crimes tribunal in just two years. The latest...
View ArticleAuf der Suche nach Alternativen zum CVE-Programm
Sollte das CVE-Programm eingestellt werden, wäre die Bewertung und Behebung von Sicherheitslücken schwieriger.Dave Hoeek – shutterstock.com Der jüngste kurze Panikausbruch wegen der möglichen...
View ArticleSixfold surge of ClickFix attacks threatens corporate defenses
Incidents of ClickFix — the social engineering attack technique that tricks users into executing malicious code — are skyrocketing. ClickFix attacks typically involve displaying a fake error or...
View ArticleNorth Korean crypto thieves deploy custom Mac backdoor
North Korean threat actors are targeting companies from the Web3 and crypto industries with a backdoor designed for macOS written in niche programming language Nim. The attackers are also using...
View Article5 multicloud security challenges — and how to address them
A multicloud environment is now standard for midsize and large organizations, with tech leaders opting to use multiple cloud providers for the improved flexibility, resiliency, and additional...
View ArticleRussland nutzt Medienplattform für Desinformation
Die Bundesregierung macht Russland für Desinformation im Netz verantwortlich.Skorzewiak – shutterstock.com Die Bundesregierung macht Russland für Desinformation verantwortlich, die über eine von der...
View ArticleThird-party risk management: How to avoid compliance disaster
Whether your organization is aware or not, it does relly on third-party services providers that help to make business processes more effective and efficient. However, working with third parties also...
View ArticleErneute Cyberattacke auf Internationalen Strafgerichtshof
Der Internationale Strafgerichtshof wurde bereists zum zweiten Mal von einer Cyberattacke getroffen.Nominesine – shutterstock.com Der Internationale Strafgerichtshof (IStGH) ist Opfer eines...
View ArticleHardcoded root credentials in Cisco Unified CM trigger max-severity alert
Cisco (Nasdaq:CSCO) has patched a max severity flaw in its Unified Communications Manager (Unified CM) and Session Management Edition (Unified CM SME) products that could let attackers walk right in...
View ArticleHunters International shuts ransomware operations, reportedly becomes an...
Ransomware gang Hunters International says it’s shutting down its operations for unexplained reasons, and is offering decryption keys to victim organizations. The offer of decryption keys could be...
View ArticleSecurity-KPIs und -KRIs: So messen Sie Cybersicherheit
Cybersicherheit zu messen, ist kein Kinderspiel. Foto: Ultraskrip – shutterstock.comEine wichtige Säule jedes ausgereiften Cyberrisk-Programms ist die Fähigkeit, die Performance der IT-Security und...
View ArticleCybersecurity in the supply chain: strategies for managing fourth-party risks
Fourth-party vendors have become a serious supply chain cybersecurity blind spot. Unlike third parties with direct contractual relationships, fourth parties — the suppliers your vendors rely on —...
View ArticleDobrindt will mehr in Cybersicherheit investieren
Bundesinnenminister Alexander Dobrindt will den Schutz vor Cyberangriffen verstärken.hotocosmos1 – shutterstock.com Bundesinnenminister Alexander Dobrindt (CSU) hat verstärkte Maßnahmen gegen...
View ArticleKritische Schwachstelle in Cisco Unified CM entdeckt
Bereits zum zweiten Mal in einer Woche muss Cisco eine Schwachstelle mit höchsten Schweregrad melden.JarTee – shutterstock.com Cisco meldete kürzlich eine Schwachstelle mit höchster...
View ArticleVerified, but vulnerable: Malicious extensions exploit IDE trust badges
Developers across popular integrated development environments (IDEs) like Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor are at risk of running malicious extensions marked as “verified.”...
View Article