Quantcast
Browsing all 1623 articles
Browse latest View live

Critical Ivanti flaw exploited despite available patches

The US Cybersecurity and Infrastructure Security Agency (CISA) has warned Ivanti customers of active exploitation of a critical Endpoint Manager (EPM) vulnerability allowing remote code execution...

View Article


Fix for BGP routing insecurity ‘plagued by software vulnerabilities’ of its...

Resource Public Key Infrastructure (RPKI) is not yet the simple fix for the security weaknesses of the internet’s Border Gateway Protocol (BGP) many in the communications industry think it is, a team...

View Article


DDoS attacks are increasingly targeting critical infrastructure

Critical infrastructure sectors including banking, financial services, government, and public utilities such as energy providers, experienced a 55% increase in distributed denial-of-service (DDoS)...

View Article

Make OT networks a priority, say nine national security agencies

To most people in IT, what happens inside operational technology (OT) networks is a bit of a mystery. They’re hidden networks that keep everything from critical infrastructure to manufacturing humming...

View Article

Over 80% of phishing sites now target mobile devices

Mobile-targeted phishing (M-ishing) attacks are seeing a significant rise with more than four out of every five phishing sites now specifically targeting mobile devices, according to a report by...

View Article


Image may be NSFW.
Clik here to view.

Nordkoreanische Cyberspione ködern Entwickler

Nordkoreanische Hacker werden immer kreativer, wenn es darum geht, Daten zu ergaunernFOTOGRIN – shutterstock.com Softwareentwickler sind wertvolle Ziele für staatlich unterstützte Angreifer, da ihre...

View Article

Notable post-quantum cryptography initiatives paving the way toward Q-Day

The point at which quantum computers will be capable of breaking existing cryptographic algorithms — known as “Q-Day” — is approaching. Some security experts believe Q-Day will occur within the next...

View Article

DOJ seizes 41 Russian-controlled domains in cyber-espionage crackdown

The US Department of Justice (DOJ) has seized 41 internet domains used by Russian intelligence agents and their allies for cyberattacks on the US. This marks a major move to block state-sponsored...

View Article


Hackers steal sensitive customer data from thousands of online stores that...

Distinct groups of cybercriminals have been exploiting the CosmicSting flaw in Adobe’s Commerce and Magento software to steal customers’ payment information. According to research by Sansec,...

View Article


How ‘perfctl’ malware infected Linux servers undetected for years

Security researchers warn that a malware campaign dubbed perfctl has targeted millions of Linux servers over the past three to four years by attempting to exploit around 20,000 misconfigurations that...

View Article

Chief risk storyteller: How CISOs are developing yet another skill

Mastering the art of risk storytelling is essential for CISOs not just for engagement, but for driving meaningful action across the organization. The right story should emphasize cybersecurity risks...

View Article

Malware attack on State Data Center in India puts some citizen services at a...

India’s hill state of Uttarakhand’s entire IT infrastructure came to a standstill on Friday after malware was detected on systems at the State Data Center. The shutdown impacted several critical...

View Article

How the increasing demand for cyber insurance is changing the role of the CISO

Demand for cyber insurance is up, and market observers expect the number of standalone cyber insurance policies will continue to rise. German multinational insurance company Munich Re has valued the...

View Article


Palo Alto Networks and Tata Comms partner for AI-powered managed security

Tata Communications has announced a partnership with Palo Alto Networks to develop integrated and managed security services. The collaboration will focus on security consolidation for global networks,...

View Article

Aryaka brings CASB into unified SASE fold

Aryaka continues to build out its SASE platform, adding new capabilities aimed at enhancing security and simplifying the adoption process for enterprises that want to consolidate their network and...

View Article


Image may be NSFW.
Clik here to view.

6 Risk-Assessment-Frameworks im Vergleich

Mit dem richtigen Framework lassen sich Risiken besser ergründen.FOTOGRIN – shutterstock.com Für viele Geschäftsprozesse ist Technologie inzwischen unverzichtbar. Deshalb zählt diese auch zu den...

View Article

Image may be NSFW.
Clik here to view.

“Einzigartig und zerstörerisch”

Häufig ist der Microsoft Authenticator die schnellste Wahl. Aber ist es auch die richtige?Ascannio – shutterstock.com Microsofts Authenticator-App hat ein Alleinstellungsmerkmal: Das Tool löscht alte...

View Article


Image may be NSFW.
Clik here to view.

Uniklinik Frankfurt nach 10 Monaten wieder online erreichbar

Universitätsklinikum Frankfurt Zehn Monate nach einem Hackerangriff sind die Stationen und Mitarbeiter der Uniklinik Frankfurt nun wieder vollständig digital über Website und E-Mail-Adressen...

View Article

Image may be NSFW.
Clik here to view.

Weg vom Hype, hin zur Realität!

Sales Pitch oder Event mit echtem Mehrwert? Die Grenzen verschwimmen zusehends.Matej Kastelic | shutterstock.com Als Chief Information Security Officer (CISO) habe ich den Wandel der Cybersicherheit...

View Article

Image may be NSFW.
Clik here to view.

Großangelegte Cyberattacke auf AWS

Forscher decken Sicherheitslücken in Webanwendungen auf. Zugangsschlüssel u.ä. wurden gestohlen.Photo For Everything – shutterstock.com Amazon Web Services (AWS) wurde Ziel einer Cyberattacke. Im Zuge...

View Article
Browsing all 1623 articles
Browse latest View live