Quantcast
Browsing all 1623 articles
Browse latest View live

The 7 most in-demand cybersecurity skills today

Cybersecurity teams find themselves understaffed, overburdened, and rushing to keep up with a rapidly changing threat landscape, as cyberattackers continually devise new ways to attack organizations —...

View Article


A security ‘hole’ in Krispy Kreme Doughnuts helped hackers take a bite

Global Doughnut and coffee chain owner Krispy Kreme, famous for its “original glazed doughnuts,” has a “portion of their IT systems” disrupted by a cyberattack. In an SEC filing on Wednesday, the...

View Article


Image may be NSFW.
Clik here to view.

Die wichtigsten Cybersecurity-Prognosen für 2025

Der Cybersecurity-Blick auf 2025.Madcat_Madlove – Shutterstock.com Cyberangriffe auf mehrere deutsche Kliniken oder weltweite IT-Ausfälle durch eine Ransomware-Attacke auf den Software-as-a-Service...

View Article

KeyTrap DNSSEC: The day the internet (almost) stood still

A severe vulnerability in the internet lookup protocol DNSSEC carried the potential to make much of the web functionally inaccessible for many, according to a presentation at Black Hat Europe. DNSSEC...

View Article

Microsoft Windows ‘Best Fit’ character conversion ‘ripe for exploitation’

Security researchers have outlined a novel attack vector that exploits the “Best Fit” character conversion technology built into Windows. The technology comes into play in string conversions,...

View Article


Europol shutters 27 DDoS sites in major crackdown

Europol has announced that it has carried out a major crackdown on cybercriminal actors in cooperation with the police authorities in 15 countries as part of an ongoing international crackdown known...

View Article

Security researchers find deep flaws in CVSS vulnerability scoring system

The industrywide method for assessing the severity of vulnerabilities in software and hardware needs to be revised because it provides potential misleading severity assessment, delegates at Black Hat...

View Article

Image may be NSFW.
Clik here to view.

10 wichtige Security-Eigenschaften: So setzen Sie die Kraft Ihres...

Lesen Sie, worauf es bei der Zusammenarbeit zwischen Ihrem IT-Security- und Engineering-Team ankommt. Foto: Lipik Stock Media – shutterstock.comSecurity-Teams bestehen in erster Linie aus...

View Article


How to turn around a toxic cybersecurity culture

A toxic cybersecurity culture affects team turnover, productivity, and morale. Worse yet, it places enterprise systems and data at risk. In a toxic cybersecurity culture, everybody believes that...

View Article


PUMA creeps through Linux with a stealthy rootkit attack

A new loadable kernel module (LKM) rootkit has been spotted in the wild compromising Linux systems with advanced stealth and privilege escalation features. PUMAKIT, as called by the Elastic Security...

View Article

Researchers expose a surge in hacker interest in SAP systems

A review of four years of threat intelligence data, presented Friday at Black Hat by Yvan Genuer, a senior security researcher at Onapsis, reports a spike in hacker interest in breaking into...

View Article

Image may be NSFW.
Clik here to view.

Cloud Access Security Broker – ein Kaufratgeber

Lesen Sie, worauf es bei der Wahl eines Cloud Access Security Broker ankommt – und welche Anbieter was genau zu bieten haben.Jack the sparow | shutterstock.com Ein Cloud Access Security Broker (CASB)...

View Article

The Hidden Risks of Mobile Calls and Messages: Why End-to-End Encryption is...

The recent breaches of sovereign telecom networks in the United States, underscores how highly connected but fragmented public networks are increasingly vulnerable to sophisticated attacks.  Another...

View Article


BlackBerry’s Critical Communications: The Triple Shield Available to...

From major IT outages and cyberattacks crippling critical infrastructure, to extreme weather testing global resilience, organizations face a relentless barrage of security and communications...

View Article

Security leaders top 10 takeaways for 2024

This year has been challenging for CISOs, with a growing burden of responsibility, the push to make cybersecurity a business enabler, the threat of legal liability for security incidents, and an...

View Article


Future of proposed US cybersecurity healthcare bills in doubt

Six months after Congressional hearings that promised action on the massive Change Healthcare ransomware attack and data theft, three pieces of proposed legislation to tighten cybersecurity...

View Article

Image may be NSFW.
Clik here to view.

SAP-Systeme geraten zunehmend ins Visier von Cyber-Angreifern

width="5000" height="2813" sizes="(max-width: 5000px) 100vw, 5000px">Angriffe auf SAP-Systeme versprechen Hackern fette Beute.ShutterstockEin Rückblick auf Bedrohungsdaten aus den zurückliegenden...

View Article


Rhode Island suffers major cyberattack, exposing personal data of thousands

Rhode Island has suffered a severe cyberattack that has potentially exposed the personal data of hundreds of thousands of residents enrolled in state-run social services programs since 2016. Officials...

View Article

Amazon refuses Microsoft 365 deployment because of lax cybersecurity

Amazon CISO CJ Moses has publicly shamed Microsoft security, halting his employer’s deployment of Microsoft 365 for a full year as the vendor tries to fix a long list of security problems that Amazon...

View Article

Catching the ghost in the machine: Adapting threat detection to cloud speed

The rapid adoption of cloud technology has transformed how businesses operate, offering scalability, agility, and opportunities for innovation. However, this transformation has also introduced a...

View Article
Browsing all 1623 articles
Browse latest View live