Top challenges holding back CISOs’ agendas
In the past decade, every CISO knew the question awaiting them in the boardroom: Can we survive the next cyberattack? Now, as the turbulent 2024 draws to a close, the concerns have multiplied, says...
View ArticleVossko von Ransomware-Attacke getroffen
Die Systeme des Lebensmittelproduzenten Vossko wurden von Hackern angegriffen. Vossko Nach eigenen Angaben hat Vossko am 14. November einen Cyberangriff erlitten. Die Täter hatten dabei die Systeme...
View ArticleAustralia’s first Cyber Security Act passes both houses
The Cyber Security Legislative Reforms proposed by the Australian federal government passed both houses on 25 November, during the last week of Parliamentary sittings. This follows a long process...
View ArticleCybersecurity in der Lieferkette Wie Sie Ihre Software-Supply-Chain schützen
Um Ihre Software-Lieferkette zu schützen, kann Generative AI sehr hilfreich sein.NTPY -Shutterstock.com Es klingt wie ein Agentenkrimi: Unbekannten Drahtziehern ist es gelungen, eine Hintertür in der...
View Article9 VPN alternatives for securing remote network access
Once the staple for securing employees working remotely, VPNs were designed to provide secure access to corporate data and systems for a small percentage of a workforce while the majority worked...
View ArticleStarbucks operations hit after ransomware attack on supply chain software vendor
Starbucks is grappling with operational challenges after a ransomware attack on a third-party software provider, affecting the company’s ability to process employee schedules and payroll, according to...
View ArticleQNAP fixes critical security holes in its networking solutions
Network and software solutions provider QNAP — whose customers include trusted IT service providers like Accenture, Cognizant, and Infosys — is urging customers to apply fixes for a few critical...
View ArticleRansomware-Angriff beeinträchtigt IT von Starbucks
srcset="https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2538779037.jpg?quality=50&strip=all 6000w,...
View ArticleCyberbedrohungen erkennen und reagieren: Was NDR, EDR und XDR unterscheidet
Mit Hilfe von NDR, EDR und XDR können Unternehmen Cyberbedrohungen in ihrem Netzwerk aufspüren. Foto: alphaspirit.it – shutterstock.comDie ständig wachsende Zahl von Abkürzungen in der IT-Sicherheit...
View ArticleCybersecurity’s oversimplification problem: Seeing AI as a replacement for...
There’s a philosophical concept called the Great Man Theory that suggests history is all about how significant individuals act as centers of gravity for society as a whole — think Alexander the Great,...
View ArticleDiese Unternehmen hat’s schon erwischt
Hier finden Sie aktuelle Cyberangriffe auf deutsche Unternehmen. Elena Uve – Shutterstock.com Sie denken, Ihre Sicherheitsmaßnahmen können Sie langfristig vor Cyberangriffen schützen? Oder dass Ihr...
View ArticleA US soldier is suspected of being behind the massive Snowflake data leak
One of the hackers who masterminded the Snowflake credential leak that led to the threat actors stealing data from and extorting at least 165 companies, including 560 million Ticketmaster customers...
View ArticleKostenlose KI-Apps als Köder
Hacker tarnen ihre Malware inzwischen auch als kostenlose KI-Apps. Who is Danny – Shutterstock.com Kostenfreie Apps haben schon immer Mitarbeiter angelockt, die damit ihre Arbeit erleichtern möchten....
View ArticleRussian APT RomCom combines Firefox and Windows zero-day flaws in drive-by...
A Russia-aligned group that engages in both cybercrime and cyberespionage operations used a zero-click exploit chain last month that combined previously unknown and unpatched vulnerabilities in...
View ArticleBug causes Cloudflare to lose customer logs
A Wednesday blog post from Cloudflare revealed that a software bug resulted in the loss of about 55% of the logs that would have been sent to customers over a 3.5-hour period on 14 November. The...
View ArticleDie gefährlichsten Software-Schwachstellen 2024
MITRE hat die 25 häufigsten und schwerwiegendsten Software-Schwachstellen des Jahres 2024 ermittelt. solarseven/shutterstock.com Die US-Cybersicherheitsbehörde CISA und die Non-Profit-Organisation...
View ArticleHow not to hire a North Korean IT spy
CISOs looking for new IT hires already struggle with talent market shortages and bridging cybersecurity skills gaps. But now they face a growing challenge from an unexpected source: sanctions-busting...
View ArticleInstagram-Seite der CSU im Bundestag gehackt
de-nue-pic – Shutterstock.com Die Instragram-Seite der CSU-Landesgruppe im Bundestag ist gehackt worden – es wurden kurzzeitig Pro-Palästinensische Inhalte gepostet. Das bestätigte eine Sprecherin der...
View ArticleExternal Attack Surface Management (EASM): Mit diesen vier Schritten...
IT-Security-Verantwortliche sollten die Angriffsfläche permanent analysieren und schützen. Dazu müssen sie stets im Blick haben, welche Assets über das Internet erreichbar sind. Foto: NicoElNino –...
View ArticleThe CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have...
View Article