Quantcast
Channel: Cyber agencies urge organizations to collaborate to stop fast flux DNS attacks | CSO Online
Browsing all 1594 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Sehr geehrter CEO,

Mit einem offenen Brief appelliert CISO-Veteran Tyler Farrar an die CEOs dieser Welt.fizkes | shutterstock.com Nie stand mehr auf dem Spiel. Jede Woche machen neue Cybersicherheitsvorfälle...

View Article


Image may be NSFW.
Clik here to view.

Die 10 häufigsten LLM-Schwachstellen

Diese Schwachstellen sollten Sie kennen, damit Ihnen Ihr Large Language Model nicht um die Ohren fliegt. VectorMine | shutterstock.com Das Open Worldwide Application Security Project (OWASP) hat seine...

View Article


Image may be NSFW.
Clik here to view.

Top security solutions being piloted today — and how to do it right

Ask almost any CISO and they will tell you the security landscape just keeps getting more complex. New products arise, technology categories blur, vendors gobble up competitors or venture into...

View Article

Image may be NSFW.
Clik here to view.

So entgiften Sie Ihre Sicherheitskultur

Lassen Sie toxische Kulturen nicht gedeihen.ON-Photography Germany | shutterstock.com Eine positive Cybersecurity-Kultur trägt zur allgemeinen Awareness bei, ist Best Practices förderlich und kann die...

View Article

US eyes ban on TP-Link routers amid cybersecurity concerns

The US government is investigating TP-Link, a Chinese company that supplies about 65% of routers for American homes and small businesses, amid concerns about national security risks. Reports suggest...

View Article


From reactive to proactive: Redefining incident response with unified,...

In today’s rapidly evolving threat landscape, cybersecurity is a constant game of cat and mouse. The average security operations center (SOC) team receives 4,484 alerts every day and can spend up to 3...

View Article

Image may be NSFW.
Clik here to view.

Die 10 besten API-Security-Tools

Mithilfe von APIs können verschiedene Software-Komponenten und -Ressourcen miteinander interagieren. Foto: eamesBot – shutterstock.comAnwendungsprogrammierschnittstellen (Application Programming...

View Article

Russia fires its biggest cyberweapon against Ukraine

Ukraine has faced one of the most severe cyberattacks in recent history, targeting its state registries and temporarily disrupting access to critical government records. Ukrainian Deputy Prime...

View Article


Enhance Microsoft security by ditching your hybrid setup for Entra-only join

Artificial intelligence is top of mind for nearly everything Microsoft is doing these days, but there’s another goal the company would like to see its users strive to attain — one that may not be...

View Article


US order is a reminder that cloud platforms aren’t secure out of the box

This week’s binding directive to US government departments to implement secure configurations in cloud applications, starting with Microsoft 365 (M365), is a reminder to all CISOs that cloud...

View Article

Image may be NSFW.
Clik here to view.

4 Wege zu neuer Cyberabwehrstärke

Generative AI kann traditionellen Sicherheitsmaßnahmen neuen “Schwung” verleihen. Henri Studios | shutterstock.com Von Smartphones und Wearables über IoT-Geräte bis hin zu Cloud-Infrastrukturen – die...

View Article

Top 7 zero-day exploitation trends of 2024

Zero-day vulnerabilities saw big growth once again in 2024. With no patch available, zero-day flaws give attackers a significant jump on cybersecurity defense teams, making them a critical weapon for...

View Article

Image may be NSFW.
Clik here to view.

Hacker knacken das Smart Home

loading="lazy" width="400px">Im Smart Home werkeln immer mehr Devices mit Internet-Anschluss – für Hacker ein lohnendes Ziel.Andrey Suslov – shutterstock.com IoT-Geräte wie digitale Bilderrahmen...

View Article


7 biggest cybersecurity stories of 2024

Cybersecurity headlines were plenty this year, with several breaches, attacks, and mishaps drawing worldwide attention. But a few incidents in particular had far-reaching consequences, with the...

View Article

The 2024 cyberwar playbook: Tricks used by nation-state actors

In 2024, nation-state cyber activity was off the charts, with Chinese, Russian, and Iranian actors leading the charge. Their campaigns weren’t just relentless — they were innovative, using a crafty...

View Article


Image may be NSFW.
Clik here to view.

10 essenzielle Maßnahmen für physische Sicherheit

Wenn physische Security nur immer so simpel umzusetzen wäre… Foto: Leremy | shutterstock.comObwohl CISOs im Allgemeinen eher selten mit dem gesamten Spektrum der Gesundheits- und...

View Article

How are you securing your communications in the wake of the Volt Typhoon...

The FBI recently released information that text messages between Apple and Android texting systems were insecure and that attackers could listen in and access those communications, more fallout from...

View Article


Network problems delay flights at two oneworld Alliance airlines

IT problems struck flights at two oneworld Alliance member airlines this week, leading to delays and flight cancellations. Network equipment connecting internal and external systems at Japan Airlines...

View Article

Image may be NSFW.
Clik here to view.

Security-Awareness-Trainings – ein Ratgeber

Wenn Ihre erste Verteidigungslinie fällt, haben Cyberschurken leichtes Spiel.Leremy | shutterstock.com Security-Awareness-Schulungen sind für Unternehmen und Organisationen obligatorisch und sollten...

View Article

Data protection challenges abound as volumes surge and threats evolve

In the global digital economy, data is the most important asset organizations must protect from theft and damage. CISOs are fundamentally guardians of that asset, obligated to keep it secure and...

View Article
Browsing all 1594 articles
Browse latest View live