Quantcast
Browsing all 1623 articles
Browse latest View live

Romanian elections targeted with cyberattacks by foreign state-sponsored actors

Romania, an EU and NATO member state, faced tens of thousands of intrusion attempts — some successful — that targeted its election IT infrastructure before and during the first round of its...

View Article


Solving networking and security challenges in the modern branch

As organizations embrace digital transformation, branch offices have become critical hubs for innovation and operations. They host diverse devices, users, and cloud-enabled applications that drive...

View Article


Mitel MiCollab VoIP authentication bypass opens new attack paths

Security researchers have discovered a new issue in the Mitel MiCollab enterprise VoIP platform that allows attackers to access administrative features without authentication. The discovery was made...

View Article

Securing cloud-native applications: Why a comprehensive API security strategy...

Despite their capabilities and benefits, cloud-native applications also present several security challenges. Application programming interfaces (APIs) are among the top areas of risk for these...

View Article

CISOs still cautious about adopting autonomous patch management solutions

Failing to patch vulnerabilities keeps biting CISOs. The most recent evidence: Last month, the Five Eyes cybersecurity agencies in the US, the UK, Australia, Canada, and New Zealand reported that the...

View Article


Image may be NSFW.
Clik here to view.

Die besten Hacker-Filme

Vorsicht, dieses Film-Listicle kann zu Prokrastination verführen!Nomad Soul | shutterstock.com Security-Profis und -Entscheider mit Hang zur Filmkunst müssen auch nach Feierabend nicht auf ihr...

View Article

Data deletion enters the ransomware chat

Ransomware remains one of the biggest cyber threats to companies today. In a survey by security provider Cohesity, 83% of respondents said they were affected by a ransomware attack in the first half...

View Article

Image may be NSFW.
Clik here to view.

Sind Macs noch sicher?

MacOS galt lange als „Malware-frei“. Eine Studie legt nahe: Diese Zeiten sind längst vorbei.Zyracuze | shutterstock.com MacOS und das Apple-Ökosystem allgemein gelten sowohl unter Benutzern als auch...

View Article


8 biggest cybersecurity threats manufacturers face

The manufacturing sector’s rapid digital transformation, complex supply chains, and reliance on third-party vendors make for a challenging cyber threat environment for CISOs. Manufacturers — often...

View Article


FCC calls for urgent cybersecurity overhaul amid Salt Typhoon espionage case

In the wake of the Salt Typhoon cyberespionage campaign allegedly linked to China, Federal Communications Commission (FCC) Chairwoman Jessica Rosenworcel has proposed immediate measures to strengthen...

View Article

Russian hackers abuse Cloudflare tunneling service to drop GammaDrop malware

In a new campaign, a Russia-backed advanced persistent threat (APT) group is seen abusing Cloudflare tunnels to deliver its proprietary GammaLoad malware. The threat actor, tracked as BlueAlpha, was...

View Article

Image may be NSFW.
Clik here to view.

Deutschland noch immer schlecht auf Cyberangriffe vorbereitet

srcset="https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?quality=50&strip=all 5184w,...

View Article

Image may be NSFW.
Clik here to view.

Neue EU-Gesetze zur Cyberabwehr

Die neuen Cybersicherheitsgesetze der EU konzentrieren sich darauf, Bedrohungen zu erkennen, auf Zwischenfälle zu reagieren und Dienste zu zertifizieren.Ivan Marc – Shutterstock.com Das neue...

View Article


Supply chain compromise of Ultralytics AI library results in trojanized versions

Attackers have compromised Ultralytics YOLO packages published on PyPI, the official Python package index, by compromising the build environment of the popular library for creating custom machine...

View Article

Image may be NSFW.
Clik here to view.

Haben die Russen die Wahl in Rumänien manipuliert?

Versucht Russland, einen prorussischen Rechtsextremen zum Präsidenten von Rumänien zu machen? hapelinium/shutterstock.com Angesichts staatlich unterstützter und kontrollierter Hackergruppen ist es...

View Article


Image may be NSFW.
Clik here to view.

Password Spraying verhindern in 4 Schritten

Lesen Sie, wie Sie sich vor Password-Spraying-Angriffen schützen.Markus Mainka | shutterstock.com Microsoft hat vor kurzem offengelegt, dass seine Systeme vom berüchtigten Bedrohungsakteur Midnight...

View Article

Gen AI use cases rising rapidly for cybersecurity — but concerns remain

Generative AI is being embedded into security tools at a furious pace as CISOs adopt the technology internally to automate manual processes and improve productivity. But research also suggests this...

View Article


Image may be NSFW.
Clik here to view.

Kunden sollen für Unvermögen von Unternehmen blechen

Immer mehr Unternehmen bitten ihre Kunden zur Kasse, um Bußgelder von Datenschutzverletzungen zu begleichen. frantic00/shutterstock.com Zum Schutz vor den beständig zunehmenden Cyberattacken werden...

View Article

Bug bounty programs: Why companies need them now more than ever

In the fast-evolving landscape of cybersecurity, the need for proactive measures has become more pressing than ever. When I first entered the cybersecurity field, the primary threats were largely...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity-Defizite bedrohen Deutschland

In Deutschland erhält das Thema Cybersecurity immer noch nicht die nötige Aufmerksamkeit.Askhat Gilyakhov – Shutterstock.com Laut dem Fortinet Global Cybersecurity Skills Gap Report 2024 erlebten 2023...

View Article
Browsing all 1623 articles
Browse latest View live