Quantcast
Browsing all 1623 articles
Browse latest View live

Nation state actors increasingly hide behind cybercriminal tactics and malware

State-sponsored threat actors are no strangers to false-flag operations, impersonating or relying on cybercriminal groups to hide their real objectives. But the lines between cybercrime and...

View Article


Download the AI in the Enterprise (for Real) Spotlight

Download the November 2024 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World.

View Article


Get details right to safely implement DANE in Exchange Online, warn experts

Microsoft’s announcement this week that it is adding support for two new security standards in Exchange Online is seen by experts as encouraging news — as long as CISOs and email administrators get...

View Article

Download the AI in the Enterprise (for Real) Spotlight

Download the November 2024 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World.

View Article

Image may be NSFW.
Clik here to view.

5 Top Cybersecurity-Zertifizierungen: So pushen Sie Ihre CISO-Karriere

Lesen Sie, welche Cybersecurity-Zertifizierungen Ihrer Karriere als CISO einen Schub geben. Foto: Elnur – shutterstock.comZertifizierungen in der Cybersicherheit können das vorhandene Fachwissen...

View Article


Image may be NSFW.
Clik here to view.

Wie Business Integration die Cybersicherheit stärkt

Lesen Sie, wie Sie mit Hilfe von Business Integration ihre Cybersicherheit stärken können. KorArkaR – Shutterstock.com Mehr als jedes dritte Unternehmen in Deutschland (35 Prozent) war in den letzten...

View Article

Costly and struggling: the challenges of legacy SIEM solutions

Security information and event management (SIEM) solutions have been essential in cybersecurity for many years, but as the digital environment grows more complex older SIEM systems are posing...

View Article

Enterprises look to AI to bridge cyber skills gap — but will still fall short

Global cybersecurity workforce growth has stalled in spite of a clear and growing need for skilled workers. The latest edition of ISC2’s Cybersecurity Workforce Study, published last week, reports...

View Article


A new SharePoint vulnerability is already being exploited

Attackers are exploiting a recently disclosed remote code execution vulnerability in Microsoft SharePoint to gain initial access to corporate networks. SharePoint’s main role in the Microsoft 365...

View Article


Ermittler zerschlagen Drogen-Marktplatz und DDoS-Dienst

srcset="https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_1121900963.jpg?quality=50&strip=all 5333w,...

View Article

As scams targeting the U.S. 2024 presidential election flood the darknet,...

The 2024 United States presidential election is rapidly approaching, and malicious actors are capitalizing on the attention and activity surrounding the election season to execute their scams....

View Article

Image may be NSFW.
Clik here to view.

Grenzen zwischen Cyberspionage und Cybercrime verschwimmen

Hacker aus China, Nord-Korea, Russland und dem Iran erhalten immer mehr Unterstützung, um ihre kriminellen Machenschaften für den Staat einzusetzen. Andy.LIU/Shutterstock.com Staatlich geförderte...

View Article

Okta’s ‘secure by design’ pledge suffers a buggy setback

With over 200 software vendors pledged to CISA’s “secure by design” principles and a number of them having already submitted their commitment progress reports, a few unfortunate goofs show that some...

View Article


10 ways hackers will use machine learning to launch attacks

Machine learning and artificial intelligence (AI) are becoming core technologies for threat detection and response tools. The ability to learn on the fly and automatically adapt to changing...

View Article

VMware’s AI query tool could be best for junior threat team members, say...

Don’t expect the earth to move when Broadcom’s VMware launches its new AI query tool for the vDefend platform early next year, says an industry analyst. “They seem to be making pragmatic promises,”...

View Article


24% of CISOs actively looking to leave their jobs

Nearly one in four enterprise security execs from the US and the UK are “looking to leave their roles,” according to a recent report by BlackFog Research. “The combination of emerging threats, funding...

View Article

Image may be NSFW.
Clik here to view.

Hacker mit guten Absichten sollen straffrei bleiben

Hacker müssen drei Voraussetzungen erfüllen, damit ihr Verhalten als nicht strafbar gilt.Virojt Changyencham – Shutterstock.com Wer IT-Sicherheitslücken aufspüren und schließen will, soll dafür keine...

View Article


Image may be NSFW.
Clik here to view.

Schneider Electric wieder von Ransomware-Attacke getroffen

Hackern ist es erneut gelungen, Daten von Schneider Electric zu stehlen. Casimiro PT – Shutterstock.com Die Ransomware-Bande Hellcat behauptet, in das Jira-System von Scheider Electric eingedrungen zu...

View Article

Source code alleged to be Nokia’s is for sale online

Source code and other data purportedly stolen from Nokia is up for sale on BreachForum. On Monday, BreachForum user IntelBroker made a post on the underground forum, seen by CSOonline, offering to...

View Article

Man arrested in Canada allegedly linked to Snowflake data thefts

Canadian authorities responding to a US request have arrested a man in southern Ontario for his alleged role in hacks of over 100 organizations that use the Snowflake cloud database. Following a...

View Article
Browsing all 1623 articles
Browse latest View live