Romanian elections targeted with cyberattacks by foreign state-sponsored actors
Romania, an EU and NATO member state, faced tens of thousands of intrusion attempts — some successful — that targeted its election IT infrastructure before and during the first round of its...
View ArticleSolving networking and security challenges in the modern branch
As organizations embrace digital transformation, branch offices have become critical hubs for innovation and operations. They host diverse devices, users, and cloud-enabled applications that drive...
View ArticleMitel MiCollab VoIP authentication bypass opens new attack paths
Security researchers have discovered a new issue in the Mitel MiCollab enterprise VoIP platform that allows attackers to access administrative features without authentication. The discovery was made...
View ArticleSecuring cloud-native applications: Why a comprehensive API security strategy...
Despite their capabilities and benefits, cloud-native applications also present several security challenges. Application programming interfaces (APIs) are among the top areas of risk for these...
View ArticleCISOs still cautious about adopting autonomous patch management solutions
Failing to patch vulnerabilities keeps biting CISOs. The most recent evidence: Last month, the Five Eyes cybersecurity agencies in the US, the UK, Australia, Canada, and New Zealand reported that the...
View ArticleDie besten Hacker-Filme
Vorsicht, dieses Film-Listicle kann zu Prokrastination verführen!Nomad Soul | shutterstock.com Security-Profis und -Entscheider mit Hang zur Filmkunst müssen auch nach Feierabend nicht auf ihr...
View ArticleData deletion enters the ransomware chat
Ransomware remains one of the biggest cyber threats to companies today. In a survey by security provider Cohesity, 83% of respondents said they were affected by a ransomware attack in the first half...
View ArticleSind Macs noch sicher?
MacOS galt lange als „Malware-frei“. Eine Studie legt nahe: Diese Zeiten sind längst vorbei.Zyracuze | shutterstock.com MacOS und das Apple-Ökosystem allgemein gelten sowohl unter Benutzern als auch...
View Article8 biggest cybersecurity threats manufacturers face
The manufacturing sector’s rapid digital transformation, complex supply chains, and reliance on third-party vendors make for a challenging cyber threat environment for CISOs. Manufacturers — often...
View ArticleFCC calls for urgent cybersecurity overhaul amid Salt Typhoon espionage case
In the wake of the Salt Typhoon cyberespionage campaign allegedly linked to China, Federal Communications Commission (FCC) Chairwoman Jessica Rosenworcel has proposed immediate measures to strengthen...
View ArticleRussian hackers abuse Cloudflare tunneling service to drop GammaDrop malware
In a new campaign, a Russia-backed advanced persistent threat (APT) group is seen abusing Cloudflare tunnels to deliver its proprietary GammaLoad malware. The threat actor, tracked as BlueAlpha, was...
View ArticleDeutschland noch immer schlecht auf Cyberangriffe vorbereitet
srcset="https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?quality=50&strip=all 5184w,...
View ArticleNeue EU-Gesetze zur Cyberabwehr
Die neuen Cybersicherheitsgesetze der EU konzentrieren sich darauf, Bedrohungen zu erkennen, auf Zwischenfälle zu reagieren und Dienste zu zertifizieren.Ivan Marc – Shutterstock.com Das neue...
View ArticleSupply chain compromise of Ultralytics AI library results in trojanized versions
Attackers have compromised Ultralytics YOLO packages published on PyPI, the official Python package index, by compromising the build environment of the popular library for creating custom machine...
View ArticleHaben die Russen die Wahl in Rumänien manipuliert?
Versucht Russland, einen prorussischen Rechtsextremen zum Präsidenten von Rumänien zu machen? hapelinium/shutterstock.com Angesichts staatlich unterstützter und kontrollierter Hackergruppen ist es...
View ArticlePassword Spraying verhindern in 4 Schritten
Lesen Sie, wie Sie sich vor Password-Spraying-Angriffen schützen.Markus Mainka | shutterstock.com Microsoft hat vor kurzem offengelegt, dass seine Systeme vom berüchtigten Bedrohungsakteur Midnight...
View ArticleGen AI use cases rising rapidly for cybersecurity — but concerns remain
Generative AI is being embedded into security tools at a furious pace as CISOs adopt the technology internally to automate manual processes and improve productivity. But research also suggests this...
View ArticleKunden sollen für Unvermögen von Unternehmen blechen
Immer mehr Unternehmen bitten ihre Kunden zur Kasse, um Bußgelder von Datenschutzverletzungen zu begleichen. frantic00/shutterstock.com Zum Schutz vor den beständig zunehmenden Cyberattacken werden...
View ArticleBug bounty programs: Why companies need them now more than ever
In the fast-evolving landscape of cybersecurity, the need for proactive measures has become more pressing than ever. When I first entered the cybersecurity field, the primary threats were largely...
View ArticleCybersecurity-Defizite bedrohen Deutschland
In Deutschland erhält das Thema Cybersecurity immer noch nicht die nötige Aufmerksamkeit.Askhat Gilyakhov – Shutterstock.com Laut dem Fortinet Global Cybersecurity Skills Gap Report 2024 erlebten 2023...
View Article