Cloudflare-Vorfall führt zu massivem Verlust an Logs
Unzureichend getestete Systeme und falsch konfigurierte Schutzmechanismen haben zu einem massiven Datenverlust geführt. T. Schneider/shutterstock.com Am 14. November 2024 führte eine Fehlkonfiguration...
View ArticleSecurity-FinOps collaboration can reap hidden cloud benefits: 11 tips
For enterprises operating on the cloud, security and cost management are rising concerns. Typically, these issues are addressed in silos, with cyber teams and FinOps teams pursuing their charters and...
View ArticleRansomware-Trend: Hacker mit Zerstörungsdrang
Hacker setzen bei Ransomware-Angriffen immer häufiger auf Zerstörung und nicht mehr “nur” auf Erpressung.Gearstd – Shutterstock.com Ransomware zählt nach wie vor zu den größten Cyberbedrohungen für...
View ArticlePopular game script spoofed to infect thousands of game developers
A malware loader, now named GodLoader, has been observed to be using Godot, a free and open-source game engine, as its runtime to execute malicious codes and has dropped known malware on at least...
View ArticleWas ist ein Keylogger?
Keylogger sind Malware der alten Schule. Lesen Sie, wie die Tools zur Tastaturüberwachung funktionieren und warum sie nicht nur etwas für Cyberkriminelle sind. IM_photo | shutterstock.com Auch wenn...
View ArticleWorking in critical infrastructure? Boost your effectiveness with these...
Hybrid warfare between nation-states is imperilling critical infrastructure around the world, both physically and electronically. Since the start of the Ukraine-Russia conflict, hybrid cyber/physical...
View ArticleAWS launches tools to tackle evolving cloud security threats
The increasing sophistication and scale of cyber threats pose a growing challenge for enterprises managing complex cloud environments. Security teams often face overwhelming volumes of alerts,...
View ArticlePhishing mit Word-Dokumenten und QR-Code
Cyberkriminelle nutzen defekte Word-Dateien, um Sicherheitssoftware zu umgehen und ihre Opfer zu täuschen. JLStock/shutterstock.com Phishing ist kein neues Problem, einzig die Art und Weise wie es...
View ArticleDownload the Cloud Optimization Enterprise Spotlight
Download the December 2024 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World.
View ArticleDownload our endpoint detection and response (EDR) buyer’s guide
From the editors of CSO, this enterprise buyer’s guide helps security IT staff understand what endpoint detection and response (EDR) tools can do for their organizations and how to choose the right...
View ArticleHundreds of UK Ministry of Defence passwords found circulating on the dark web
The login credentials of nearly 600 employees accessing a key British Ministry of Defence (MOD) employee portal have been discovered circulating on the dark web in the last four years, it has been...
View ArticleCIO POV: Building trust in cyberspace
Trust lies at the heart of every relationship, transaction, and encounter. Yet in cyberspace—where we work, live, learn, and play—trust can become elusive. Since the dawn of the internet nearly 50...
View ArticleIntelligent Privilege Controls™: A quick guide to secure every identity
Security used to be simpler. Employees, servers, and applications were on site. IT admins were the only privileged identities you had to secure, and a strong security perimeter helped to keep all the...
View ArticleWhy identity security is your best companion for uncharted compliance challenges
In today’s rapidly evolving global regulatory landscape, new technologies, environments, and threats are heightening cybersecurity and data privacy concerns. In the last year, governing bodies have...
View ArticleDer Weg zum nachhaltigen Cyberschutz
Wenn im Ernstfall Unternehmen stillstehen, sind die Sorgen groß. Mit Cyberresilienz tragen CISOs dazu bei, dass der Geschäftsbetrieb weitergehen kann. Kjetil Kolbjornsrud Die deutschen Ergebnisse der...
View ArticleWant to be a cybersecurity pro? Use generative AI to get some simulated training
I often get approached by young, ambitious people looking to start a cybersecurity career. Some are studying cybersecurity in college, some are looking to jump from IT, and some believe that the field...
View Article10 most critical LLM vulnerabilities
Enterprise adoption of generative AI technologies has exploded in 2024 due to the rapid evolution of the technology and the emergence of a variety of business use cases. According to Menlo Ventures,...
View ArticleEU enacts new laws to strengthen cybersecurity defenses and coordination
The European Union has enacted two new laws to bolster its cybersecurity defenses and coordination mechanisms. The measures, part of the cybersecurity legislative package, include the Cyber Solidarity...
View ArticleSmokeLoader picks up ancient MS Office bugs to pack fresh credential stealer
Threat actors are using a well-known modular malware loader, SmokeLoader, to exploit known Microsoft Office vulnerabilities and steal sensitive browser credentials. The loader which runs a framework...
View ArticleMöglicher Cyberangriff: IT-Ausfall bei Medion
Zunächst hat Medion einen Cyberangriff als Ursache für den IT-Ausfall genannt. Mittlerweile spricht das Unternehmen “nur” noch von einer IT-Störung.OleksandrShnuryk – Shutterstock.com Der...
View Article