Global Swift banking network readies AI platform to combat cyber threats
The global Swift (Society for Worldwide Interbank Financial Telecommunication) messaging platform, fundamental to the movement of money around the globe by institutions, is about to deploy its first...
View ArticleRisiko-Management für KMU: Die 8 wichtigsten Schritte zur Abwehr von Ransomware
Verbessern Sie Ihre Selbstverteidigung, um große Schäden durch Ransomware zu vermeiden. Foto: Nomad_Soul – shutterstock.comRansomware betrifft Unternehmen auf der ganzen Welt. Doch gerade kleine und...
View ArticleFast alle Cyberangriffe auf GenAI führen zum Erfolg
LLMs wie Chatbots werden immer häufiger genutzt, aber selten ausreichend vor Cyberattacken geschützt.Shutterstock – GrandeDuc Pillar Security, ein israelisches Unternehmen für...
View ArticleNIS2’s cybersecurity value spreads beyond its expanded scope
The European Union’s NIS2 (Network and Information Security) Directive has come into force to update the first 2016 NIS regulation to better address an increasingly damaging cyber threat landscape....
View ArticleEU’s NIS2 Directive for cybersecurity resilience enters full enforcement
After years in development the European Union’s NIS2 Directive comes into full effect this week. NIS2 expands the scope of its predecessor to cover 15 sectors, including manufacturing, digital...
View ArticleCyberangriff auf Johannesstift Diakonie
Aufgrund einer Cyberattacke auf die Johannesstift Diakonie kämpfen mehrere Krankhäuser in Berlin mit technischen Problemen.yod370 – Shutterstock.com Die Johannesstift Diakonie ist das größte...
View ArticleMicrosoft fails to collect critical security logs, exposing customers to risks
Microsoft has admitted that it failed to collect crucial security logs for nearly a month due to a bug, leaving enterprise customers vulnerable to cyberattacks. The issue, which occurred between...
View ArticleThe Google Meet error you last saw could be someone trying to hack your system
Windows and Mac users are being targeted by a new social engineering campaign, ClickFix, that uses fake Google Meet landings for planting info-stealing malware onto victim systems. According to a...
View Article3 key considerations when evaluating GenAI solutions for cybersecurity
At the start of this year, I shared my view that 2024 would be when security practitioners bridge the cyber divide – the use of artificial intelligence (AI) for cybersecurity will be on the rise and...
View ArticleSchutz vor Business E-Mail Compromise: 8 wichtige Punkte für Ihre BEC-Richtlinie
Lesen Sie, welche Punkte in einer Richtlinie zum Schutz vor Business E-Mail Compromise (BEC) enthalten sein sollten. Foto: MMD Creative – shutterstock.comLaut Verizon machten BEC-Angriffe (Business...
View ArticleMeet Latrodectus: Initial access brokers’ new favorite malware loader
This year law enforcement agencies have disrupted some of the biggest botnets that were used as payload distribution platforms by ransomware gangs. But when big players disappear from the...
View ArticleWhat makes a great CISO
The CISO’s role has evolved from managing technical controls to also supporting the business strategy. Becoming a great CISO requires more than technical expertise. To be highly effective, CISOs must...
View ArticleRussian group’s hack of Texas water system underscores critical OT cyber threats
Cybersecurity threats to water utilities have accelerated in 2024 as Iranian, Chinese, and Russian threat actors increasingly target these critical systems. A spate of apparent joy-riding intrusions...
View ArticleSpectre flaw still haunts Intel and AMD chips, putting security at risk
Researchers from ETH Zurich have discovered new vulnerabilities in Intel and AMD processors, six years after the Spectre security flaws were first identified. The new Spectre variant, named...
View ArticleCisco bestätigt Datenklau
Hacker haben Daten von Cisco gestohlen.JRdes – Shutterstock.com In der vergangenen Woche sorgte ein Darknet-Post mit angeblich gestohlenen Cisco-Daten für Aufregung. Hacker behaupteten unter anderem...
View ArticleInternet Archive breached twice within days
Internet Archive continues to be in trouble as, according to unnamed claims made on Sunday, it suffered a secondary breach days after falling prey to a security incident that exposed 31 million unique...
View ArticleMicrosoft geht jetzt unter die Phish-Fänger
Microsoft geht zwar nicht unter die Imker, jagt aber Kriminelle mit süßen Daten. Shuttertstock – inspiring.team Die Anzahl, Arten und Qualität von Cyberangriffen nehmen beständig zu – soweit ein alter...
View ArticleSingapore unveils AI system guidelines, emphasizing secure-by-design
Singapore has rolled out new cybersecurity measures to safeguard AI systems against traditional threats like supply chain attacks and emerging risks such as adversarial machine learning, including...
View ArticleLow turnover leaves job-seeking CISOs with nowhere to go
CISO job turnover is continuing to drop, placing security leaders looking to gain a salary increase or leave an unfulfilling role in a difficult position. Turnover in top security roles decreased from...
View Article7 risk management mistakes CISOs still make
CISOs know risk management is essential for building and maintaining a resilient enterprise security posture. Yet despite their best efforts and good intentions, many security leaders continue to fall...
View Article