Quantcast
Browsing all 1623 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

SBOM erklärt: Was ist eine Software Bill of Materials?

Softwareentwicklung und Autoproduktion haben mehr gemein, als man denkt. Lesen Sie, was Sie zum Thema Software Bill of Materials (SBOM) wissen sollten. Foto: Ju1978 – shutterstock.comEine Software...

View Article


11 biggest financial sector cybersecurity threats

The financial sector faces a wide array of serious security threats that will only increase as cybercriminals make greater use of AI. Financial sector firms are uniquely exposed to cyber risk due to...

View Article


Weaponized pen testers are becoming a new hacker staple

Malicious adaptations of popular red teaming tools like Cobalt Strike and Metasploit are causing substantial disruption, emerging as a dominant strategy in malware campaigns. According to research by...

View Article

Image may be NSFW.
Clik here to view.

Chinas Cyber-Pandas greifen Telekom-Unternehmen an

Setzt China im Rahmen seiner Belt and Road Initiative auf Cyberspionage? ndutfrea/shutterstock.com Dank des von ihm verschuldeten Sicherheitsfiaskos hat Crowd-Strike in letzter Zeit zwar mehr von sich...

View Article

Image may be NSFW.
Clik here to view.

Erneute Phishing-Attacke auf IHK-Unternehmen

Hacker versuchen erneut an Daten von IHK-Unternehmen zu gelangen. janews – Shutterstock.com Cyberkriminelle lassen sich immer wieder neue Tricks einfallen, um an Unternehmensdaten zu gelangen. Aktuell...

View Article


CSO30 ASEAN 2024: The top 30 cybersecurity leaders in Southeast Asia and Hong...

The fourth CSO30 ASEAN Awards programme recognises the top 30 cybersecurity leaders driving business value, demonstrating leadership, and influencing rapid change across Southeast Asia and Hong Kong....

View Article

Act fast to snuff out employee curiosity over ‘free’ AI apps

The word “free” has always tempted employees who are looking for an app or template to make their work easier. These days, combine “free” with “AI” and the lure is almost irresistible. Since the...

View Article

What CISOs need to know about the SEC’s breach disclosure rules

The US Securities and Exchange Commission’s (SEC) breach disclosure rules have placed increased responsibility on the CISOs of publicly traded companies in the reporting of cybersecurity incidents and...

View Article


North Korean fake IT workers up the ante in targeting tech firms

North Korean fake IT worker scams are evolving to incorporate theft and extortion as more examples of targeting against technology and other companies emerge. The deception typically features North...

View Article


Finastra investigates breach potentially affecting top global banks

Popular financial software and services provider, Finastra, whose clientele includes 45 of the world’s top 50 banks, is reportedly warning these institutes of a potential breach affecting one of its...

View Article

Job termination scam warns staff of phony Employment Tribunal decision

Creators of phishing messages usually want to create anxiety in their targets so they’ll unwittingly download malware. And nothing gets stomachs churning more than the possibility of losing your job....

View Article

Image may be NSFW.
Clik here to view.

Finastra bestätigt Datendiebstahl

Der Finanztech-Anbieter Finastra hat eingeräumt, dass Kundendaten gestohlen wurden.LCV -Shutterstock.com Wie Security-Experte Brian Krebs auf seiner Website berichtet, hat  ein Cyberkrimineller in...

View Article

Rising ClickFix malware distribution trick puts PowerShell IT policies on notice

Threat groups are increasingly adopting a social engineering technique dubbed ClickFix to trick users into copying malicious PowerShell code and executing it themselves. Despite requiring more user...

View Article


FBI pierces ‘anonymity’ of cryptocurrency, secret domain registrars in...

The US Justice Department on Wednesday announced the arrest of five suspected members of the notorious Scattered Spider phishing crew, but the most interesting part of the case was a US Federal Bureau...

View Article

Image may be NSFW.
Clik here to view.

Was ist ein Botnet?

Ein Botnetz besteht aus vielen “Zombie”-Rechnern und lässt sich beispielsweise einsetzen, um DDoS-Attacken zu fahren. Das sollten Sie zum Thema wissen.  FOTOKINA | shutterstock.com Kriminelle Hacker...

View Article


17 hottest IT security certs for higher pay today

With the New Year on the horizon, many IT professionals may be looking to improve their careers in 2025 but need direction on the best way. The latest data from Foote Partners may provide helpful...

View Article

Image may be NSFW.
Clik here to view.

Mafia-Beratungsstelle befürchtet Datenleck

Mit der Mafia ist auch in Japan nicht zu spaßen.Makhh | shutterstock.com Werden persönliche Daten gestohlen, ist das für die Betroffenen alles andere als ein Vergnügen. Geht es dabei allerdings um...

View Article


Image may be NSFW.
Clik here to view.

Hartmannbund: Deutscher Ärzteverband im Visier von RansomHub

Der Ärzteverband Hartmannbund ist möglicherweise von einem Cyberangriff betroffen.Mo Photography Berlin – Shutterstock.com Der Gesundheitsbereich gerät immer wieder in den Fokus von Cyberkriminellen....

View Article

Gangster counseling center fears data leak

If personal data is stolen, it is anything but a pleasure for those affected. However, when it comes to those previously involved in, or victims of, organized crime, the potential consequences are far...

View Article

What the cyber community should expect from the Trump transition

Donald Trump’s decisive win in this year’s presidential election promises to deliver radical changes to how the US government operates. Trump’s positions on a range of social, economic, and military...

View Article
Browsing all 1623 articles
Browse latest View live