SBOM erklärt: Was ist eine Software Bill of Materials?
Softwareentwicklung und Autoproduktion haben mehr gemein, als man denkt. Lesen Sie, was Sie zum Thema Software Bill of Materials (SBOM) wissen sollten. Foto: Ju1978 – shutterstock.comEine Software...
View Article11 biggest financial sector cybersecurity threats
The financial sector faces a wide array of serious security threats that will only increase as cybercriminals make greater use of AI. Financial sector firms are uniquely exposed to cyber risk due to...
View ArticleWeaponized pen testers are becoming a new hacker staple
Malicious adaptations of popular red teaming tools like Cobalt Strike and Metasploit are causing substantial disruption, emerging as a dominant strategy in malware campaigns. According to research by...
View ArticleChinas Cyber-Pandas greifen Telekom-Unternehmen an
Setzt China im Rahmen seiner Belt and Road Initiative auf Cyberspionage? ndutfrea/shutterstock.com Dank des von ihm verschuldeten Sicherheitsfiaskos hat Crowd-Strike in letzter Zeit zwar mehr von sich...
View ArticleErneute Phishing-Attacke auf IHK-Unternehmen
Hacker versuchen erneut an Daten von IHK-Unternehmen zu gelangen. janews – Shutterstock.com Cyberkriminelle lassen sich immer wieder neue Tricks einfallen, um an Unternehmensdaten zu gelangen. Aktuell...
View ArticleCSO30 ASEAN 2024: The top 30 cybersecurity leaders in Southeast Asia and Hong...
The fourth CSO30 ASEAN Awards programme recognises the top 30 cybersecurity leaders driving business value, demonstrating leadership, and influencing rapid change across Southeast Asia and Hong Kong....
View ArticleAct fast to snuff out employee curiosity over ‘free’ AI apps
The word “free” has always tempted employees who are looking for an app or template to make their work easier. These days, combine “free” with “AI” and the lure is almost irresistible. Since the...
View ArticleWhat CISOs need to know about the SEC’s breach disclosure rules
The US Securities and Exchange Commission’s (SEC) breach disclosure rules have placed increased responsibility on the CISOs of publicly traded companies in the reporting of cybersecurity incidents and...
View ArticleNorth Korean fake IT workers up the ante in targeting tech firms
North Korean fake IT worker scams are evolving to incorporate theft and extortion as more examples of targeting against technology and other companies emerge. The deception typically features North...
View ArticleFinastra investigates breach potentially affecting top global banks
Popular financial software and services provider, Finastra, whose clientele includes 45 of the world’s top 50 banks, is reportedly warning these institutes of a potential breach affecting one of its...
View ArticleJob termination scam warns staff of phony Employment Tribunal decision
Creators of phishing messages usually want to create anxiety in their targets so they’ll unwittingly download malware. And nothing gets stomachs churning more than the possibility of losing your job....
View ArticleFinastra bestätigt Datendiebstahl
Der Finanztech-Anbieter Finastra hat eingeräumt, dass Kundendaten gestohlen wurden.LCV -Shutterstock.com Wie Security-Experte Brian Krebs auf seiner Website berichtet, hat ein Cyberkrimineller in...
View ArticleRising ClickFix malware distribution trick puts PowerShell IT policies on notice
Threat groups are increasingly adopting a social engineering technique dubbed ClickFix to trick users into copying malicious PowerShell code and executing it themselves. Despite requiring more user...
View ArticleFBI pierces ‘anonymity’ of cryptocurrency, secret domain registrars in...
The US Justice Department on Wednesday announced the arrest of five suspected members of the notorious Scattered Spider phishing crew, but the most interesting part of the case was a US Federal Bureau...
View ArticleWas ist ein Botnet?
Ein Botnetz besteht aus vielen “Zombie”-Rechnern und lässt sich beispielsweise einsetzen, um DDoS-Attacken zu fahren. Das sollten Sie zum Thema wissen. FOTOKINA | shutterstock.com Kriminelle Hacker...
View Article17 hottest IT security certs for higher pay today
With the New Year on the horizon, many IT professionals may be looking to improve their careers in 2025 but need direction on the best way. The latest data from Foote Partners may provide helpful...
View ArticleMafia-Beratungsstelle befürchtet Datenleck
Mit der Mafia ist auch in Japan nicht zu spaßen.Makhh | shutterstock.com Werden persönliche Daten gestohlen, ist das für die Betroffenen alles andere als ein Vergnügen. Geht es dabei allerdings um...
View ArticleHartmannbund: Deutscher Ärzteverband im Visier von RansomHub
Der Ärzteverband Hartmannbund ist möglicherweise von einem Cyberangriff betroffen.Mo Photography Berlin – Shutterstock.com Der Gesundheitsbereich gerät immer wieder in den Fokus von Cyberkriminellen....
View ArticleGangster counseling center fears data leak
If personal data is stolen, it is anything but a pleasure for those affected. However, when it comes to those previously involved in, or victims of, organized crime, the potential consequences are far...
View ArticleWhat the cyber community should expect from the Trump transition
Donald Trump’s decisive win in this year’s presidential election promises to deliver radical changes to how the US government operates. Trump’s positions on a range of social, economic, and military...
View Article