EDR-Software – ein Kaufratgeber
EDR-Software verhindert Endpunkt-Sicherheitsdebakel. Die richtige Lösung vorausgesetzt.SvetaZi | shutterstock.com Software im Bereich Endpoint Detection and Response (EDR) erfreut sich weiterhin...
View ArticleTop tips for CISOs running red teams
Red team is the de facto standard in offensive security testing when you want to know how all security investments — from technological controls to user training to response procedures — work together...
View ArticleZukunft schenken und die Hacker School unterstützen
Mitmachen und Zukunft schenken. In einer Zeit, in der IT-Technik und digitale Tools alle Facetten unseres Arbeitens und unseres Lebens beeinflussen, gehören digitale Skills einfach dazu. Es geht um...
View ArticleAWS customers face massive breach amid alleged ShinyHunters regroup
Terabytes of data belonging to thousands of AWS customers, including customer details, AWS credentials, and proprietary source code, were compromised in a large-scale cyber operation linked to the...
View ArticleTermite-Bande bekennt sich zu Blue Yonder-Hack
Die Ransomware-Bande Termite ist offenbar für den Hackerangriff auf den SaaS-Anbieter Blue Yonder verantwortlich. DC Studio – Shutterstock.com Die Ransomware-Gruppe Termite hat jetzt die Verantwortung...
View ArticleBlack Hat Europe preview: Cryptographic protocol attacks and AI in the spotlight
This week in London Black Hat Europe will feature a diverse range of talks and presentations covering the latest developments in cybersecurity. The opening keynote on Wednesday will be delivered by...
View ArticleBlack Hat: Latest news and insights
The infosecurity world decamps to London this week, with research on vulnerabilities in AI systems at the fore of the latest edition of Black Hat Europe. The four-day program runs from Dec. 9-12, with...
View ArticleRomanian energy supplier Electrica hit by ransomware
First, the Romanian presidential election was annulled after being targeted with cyberattacks from foreign state-sponsored actors and a suspected Russian-controlled massive TikTok influence campaign....
View ArticleAttackers exploit zero-day RCE flaw in Cleo managed file transfer
Security researchers have warned about in-the-wild attacks that exploit a remote code execution vulnerability in managed file transfer (MFT) solutions developed by enterprise software vendor Cleo...
View ArticleUS sanctions Chinese cybersecurity firm over global malware campaign
The US government has imposed sanctions on Chinese cybersecurity firm Sichuan Silence Information Technology and one of its employees, Guan Tianfeng, for their alleged involvement in a 2020 global...
View ArticleISO und ISMS: Darum gehen Security-Zertifizierungen schief
Mit einer ISO 27001-Zertifizierung weisen Unternehmen nach, dass sie ein wirksames Informationssicherheits-Managementsystems (ISMS) betreiben. Lesen Sie, weshalb der Zertifizierungsprozess häufig...
View ArticleSalt Typhoon poses a serious supply chain risk to most organizations
In the late spring of 2024, the US Federal Bureau of Investigation (FBI) began investigating reports of malicious activities targeting multiple US telecommunications companies. The agency determined...
View ArticleBug bounty programs can deliver significant benefits, but only if you’re ready
Bug bounty programs, which offer financial incentives to outside security researchers to find software vulnerabilities, seem like a 21st-century phenomenon, but according to bug bounty platform...
View ArticleRumänien kommt digital weiterhin nicht zur Ruhe
Nehmen die Russen Rache an Rumänien für die gescheiterte Wahl „ihres“ Kandidaten?structuresxx – shutterstock.com Zuerst wurde die rumänischen Präsidentschaftswahlen annulliert, nachdem sie durch eine...
View ArticleHersteller von Geräten für die Herzchirurgie angegriffen
Cyberkriminelle üben immer häufiger Druck auf den Gesundheitssektor aus – sei es durch den Diebstahl von Daten oder Angriffe auf Zulieferer. Germany only – metamorworks/shutterstock.com Der Schutz der...
View ArticleMicrosoft secretly stopped actors from snooping on your MFA codes
Microsoft may have silently fixed a problem with its MFA implementation that attackers could have used to gain access to Outlook, OneDrive, Teams, and Azure accounts without any user interaction....
View ArticleCardiac surgery device manufacturer falls prey to ransomware
The healthcare industry has been increasingly in the crosshairs of cyberattackers this year, with ransomware near the top of the sector’s biggest cyber threats. Hackers are attacking IT systems and...
View ArticleThe imperative for governments to leverage genAI in cyber defense
In an era where cyber threats are evolving at an unprecedented pace, the need for robust cyber defense mechanisms has never been more critical. Sixty-two percent of all cyberattacks focus on public...
View ArticleAttackers can abuse the Windows UI Automation framework to steal data from apps
An accessibility feature built into Windows to facilitate the use of computers by people with disabilities can be abused by malware to steal data from other applications or control them in malicious...
View ArticleAMD data center chips vulnerable to revealing data through ‘BadRAM’ attack
AMD’s Secure Encrypted Virtualization (SEV), meant to protect processor memory from prying eyes in virtual machine (VM) environments, can be tricked into giving access to its encrypted memory contents...
View Article