Critical Ivanti flaw exploited despite available patches
The US Cybersecurity and Infrastructure Security Agency (CISA) has warned Ivanti customers of active exploitation of a critical Endpoint Manager (EPM) vulnerability allowing remote code execution...
View ArticleFix for BGP routing insecurity ‘plagued by software vulnerabilities’ of its...
Resource Public Key Infrastructure (RPKI) is not yet the simple fix for the security weaknesses of the internet’s Border Gateway Protocol (BGP) many in the communications industry think it is, a team...
View ArticleDDoS attacks are increasingly targeting critical infrastructure
Critical infrastructure sectors including banking, financial services, government, and public utilities such as energy providers, experienced a 55% increase in distributed denial-of-service (DDoS)...
View ArticleMake OT networks a priority, say nine national security agencies
To most people in IT, what happens inside operational technology (OT) networks is a bit of a mystery. They’re hidden networks that keep everything from critical infrastructure to manufacturing humming...
View ArticleOver 80% of phishing sites now target mobile devices
Mobile-targeted phishing (M-ishing) attacks are seeing a significant rise with more than four out of every five phishing sites now specifically targeting mobile devices, according to a report by...
View ArticleNordkoreanische Cyberspione ködern Entwickler
Nordkoreanische Hacker werden immer kreativer, wenn es darum geht, Daten zu ergaunernFOTOGRIN – shutterstock.com Softwareentwickler sind wertvolle Ziele für staatlich unterstützte Angreifer, da ihre...
View ArticleNotable post-quantum cryptography initiatives paving the way toward Q-Day
The point at which quantum computers will be capable of breaking existing cryptographic algorithms — known as “Q-Day” — is approaching. Some security experts believe Q-Day will occur within the next...
View ArticleDOJ seizes 41 Russian-controlled domains in cyber-espionage crackdown
The US Department of Justice (DOJ) has seized 41 internet domains used by Russian intelligence agents and their allies for cyberattacks on the US. This marks a major move to block state-sponsored...
View ArticleHackers steal sensitive customer data from thousands of online stores that...
Distinct groups of cybercriminals have been exploiting the CosmicSting flaw in Adobe’s Commerce and Magento software to steal customers’ payment information. According to research by Sansec,...
View ArticleHow ‘perfctl’ malware infected Linux servers undetected for years
Security researchers warn that a malware campaign dubbed perfctl has targeted millions of Linux servers over the past three to four years by attempting to exploit around 20,000 misconfigurations that...
View ArticleChief risk storyteller: How CISOs are developing yet another skill
Mastering the art of risk storytelling is essential for CISOs not just for engagement, but for driving meaningful action across the organization. The right story should emphasize cybersecurity risks...
View ArticleMalware attack on State Data Center in India puts some citizen services at a...
India’s hill state of Uttarakhand’s entire IT infrastructure came to a standstill on Friday after malware was detected on systems at the State Data Center. The shutdown impacted several critical...
View ArticleHow the increasing demand for cyber insurance is changing the role of the CISO
Demand for cyber insurance is up, and market observers expect the number of standalone cyber insurance policies will continue to rise. German multinational insurance company Munich Re has valued the...
View ArticlePalo Alto Networks and Tata Comms partner for AI-powered managed security
Tata Communications has announced a partnership with Palo Alto Networks to develop integrated and managed security services. The collaboration will focus on security consolidation for global networks,...
View ArticleAryaka brings CASB into unified SASE fold
Aryaka continues to build out its SASE platform, adding new capabilities aimed at enhancing security and simplifying the adoption process for enterprises that want to consolidate their network and...
View Article6 Risk-Assessment-Frameworks im Vergleich
Mit dem richtigen Framework lassen sich Risiken besser ergründen.FOTOGRIN – shutterstock.com Für viele Geschäftsprozesse ist Technologie inzwischen unverzichtbar. Deshalb zählt diese auch zu den...
View Article“Einzigartig und zerstörerisch”
Häufig ist der Microsoft Authenticator die schnellste Wahl. Aber ist es auch die richtige?Ascannio – shutterstock.com Microsofts Authenticator-App hat ein Alleinstellungsmerkmal: Das Tool löscht alte...
View ArticleUniklinik Frankfurt nach 10 Monaten wieder online erreichbar
Universitätsklinikum Frankfurt Zehn Monate nach einem Hackerangriff sind die Stationen und Mitarbeiter der Uniklinik Frankfurt nun wieder vollständig digital über Website und E-Mail-Adressen...
View ArticleWeg vom Hype, hin zur Realität!
Sales Pitch oder Event mit echtem Mehrwert? Die Grenzen verschwimmen zusehends.Matej Kastelic | shutterstock.com Als Chief Information Security Officer (CISO) habe ich den Wandel der Cybersicherheit...
View ArticleGroßangelegte Cyberattacke auf AWS
Forscher decken Sicherheitslücken in Webanwendungen auf. Zugangsschlüssel u.ä. wurden gestohlen.Photo For Everything – shutterstock.com Amazon Web Services (AWS) wurde Ziel einer Cyberattacke. Im Zuge...
View Article