Nation state actors increasingly hide behind cybercriminal tactics and malware
State-sponsored threat actors are no strangers to false-flag operations, impersonating or relying on cybercriminal groups to hide their real objectives. But the lines between cybercrime and...
View ArticleDownload the AI in the Enterprise (for Real) Spotlight
Download the November 2024 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World.
View ArticleGet details right to safely implement DANE in Exchange Online, warn experts
Microsoft’s announcement this week that it is adding support for two new security standards in Exchange Online is seen by experts as encouraging news — as long as CISOs and email administrators get...
View ArticleDownload the AI in the Enterprise (for Real) Spotlight
Download the November 2024 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World.
View Article5 Top Cybersecurity-Zertifizierungen: So pushen Sie Ihre CISO-Karriere
Lesen Sie, welche Cybersecurity-Zertifizierungen Ihrer Karriere als CISO einen Schub geben. Foto: Elnur – shutterstock.comZertifizierungen in der Cybersicherheit können das vorhandene Fachwissen...
View ArticleWie Business Integration die Cybersicherheit stärkt
Lesen Sie, wie Sie mit Hilfe von Business Integration ihre Cybersicherheit stärken können. KorArkaR – Shutterstock.com Mehr als jedes dritte Unternehmen in Deutschland (35 Prozent) war in den letzten...
View ArticleCostly and struggling: the challenges of legacy SIEM solutions
Security information and event management (SIEM) solutions have been essential in cybersecurity for many years, but as the digital environment grows more complex older SIEM systems are posing...
View ArticleEnterprises look to AI to bridge cyber skills gap — but will still fall short
Global cybersecurity workforce growth has stalled in spite of a clear and growing need for skilled workers. The latest edition of ISC2’s Cybersecurity Workforce Study, published last week, reports...
View ArticleA new SharePoint vulnerability is already being exploited
Attackers are exploiting a recently disclosed remote code execution vulnerability in Microsoft SharePoint to gain initial access to corporate networks. SharePoint’s main role in the Microsoft 365...
View ArticleErmittler zerschlagen Drogen-Marktplatz und DDoS-Dienst
srcset="https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_1121900963.jpg?quality=50&strip=all 5333w,...
View ArticleAs scams targeting the U.S. 2024 presidential election flood the darknet,...
The 2024 United States presidential election is rapidly approaching, and malicious actors are capitalizing on the attention and activity surrounding the election season to execute their scams....
View ArticleGrenzen zwischen Cyberspionage und Cybercrime verschwimmen
Hacker aus China, Nord-Korea, Russland und dem Iran erhalten immer mehr Unterstützung, um ihre kriminellen Machenschaften für den Staat einzusetzen. Andy.LIU/Shutterstock.com Staatlich geförderte...
View ArticleOkta’s ‘secure by design’ pledge suffers a buggy setback
With over 200 software vendors pledged to CISA’s “secure by design” principles and a number of them having already submitted their commitment progress reports, a few unfortunate goofs show that some...
View Article10 ways hackers will use machine learning to launch attacks
Machine learning and artificial intelligence (AI) are becoming core technologies for threat detection and response tools. The ability to learn on the fly and automatically adapt to changing...
View ArticleVMware’s AI query tool could be best for junior threat team members, say...
Don’t expect the earth to move when Broadcom’s VMware launches its new AI query tool for the vDefend platform early next year, says an industry analyst. “They seem to be making pragmatic promises,”...
View Article24% of CISOs actively looking to leave their jobs
Nearly one in four enterprise security execs from the US and the UK are “looking to leave their roles,” according to a recent report by BlackFog Research. “The combination of emerging threats, funding...
View ArticleHacker mit guten Absichten sollen straffrei bleiben
Hacker müssen drei Voraussetzungen erfüllen, damit ihr Verhalten als nicht strafbar gilt.Virojt Changyencham – Shutterstock.com Wer IT-Sicherheitslücken aufspüren und schließen will, soll dafür keine...
View ArticleSchneider Electric wieder von Ransomware-Attacke getroffen
Hackern ist es erneut gelungen, Daten von Schneider Electric zu stehlen. Casimiro PT – Shutterstock.com Die Ransomware-Bande Hellcat behauptet, in das Jira-System von Scheider Electric eingedrungen zu...
View ArticleSource code alleged to be Nokia’s is for sale online
Source code and other data purportedly stolen from Nokia is up for sale on BreachForum. On Monday, BreachForum user IntelBroker made a post on the underground forum, seen by CSOonline, offering to...
View ArticleMan arrested in Canada allegedly linked to Snowflake data thefts
Canadian authorities responding to a US request have arrested a man in southern Ontario for his alleged role in hacks of over 100 organizations that use the Snowflake cloud database. Following a...
View Article