7 fundamentale Cloud-Bedrohungen
Dieser Artikel hilft, Unsicherheiten in Cloud-Umgebungen vorzubeugen. Foto: Roman Samborskyi | shutterstock.comFür jedes Unternehmen, das sich auf die Cloud verlässt, um Services bereitzustellen,...
View Article12 cybersecurity resolutions for 2025
As cyber threats continue to evolve, CISOs must prepare for an increasingly complex threat landscape. From dealing with AI-driven attacks to managing changing regulatory requirements, it’s clear that...
View ArticlePersonal liability sours 70% of CISOs on their role
With legal accountability tightening around those charged with maintaining enterprise cybersecurity, security leaders appear to be increasingly frustrated with their roles, eyeing the exit, and...
View ArticleOpen source vulnerability scanner found with a serious vulnerability in its...
A widely popular open-source tool, Nuclei, used for scanning vulnerabilities and weaknesses in websites, cloud applications, and networks is found to have a high-severity flaw that could potentially...
View ArticleMore telecom firms were breached by Chinese hackers than previously reported
Chinese hackers linked to the Salt Typhoon cyberespionage operation have breached even more US telecommunications firms than initially reported. New victims — Charter Communications, Consolidated...
View ArticleUS military allocated about $30 billion to spend on cybersecurity in 2025
The United States military will receive about $30 billion in cybersecurity funding in fiscal 2025 from $895.2 billion earmarked for US military activities under the National Defense Authorization Act...
View ArticleGen AI is transforming the cyber threat landscape by democratizing...
Generative AI has had a significant impact on a wide variety of business processes, optimizing and accelerating workflows and in some cases reducing baselines for expertise. Add vulnerability hunting...
View ArticleChinesische Hacker attackieren US-Finanzministerium
Die IT-Security im US-Finanzministerium dürfte angesichts des chinesischen Hackerangriffs wenig erholsame Weihnachtsferien gehabt haben.Mark Gomez / Shutterstock Zum Jahreswechsel musste das...
View ArticleRussian hackers turn trusted online stores into phishing pages
In a smart campaign, Russian cybercriminals are turning trusted online stores into phishing pages that capture sensitive details through convincing payment interfaces. According to a research by the...
View ArticleCyTwist Launches Advanced Security Solution to identify AI-Driven Cyber...
CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity landscape...
View ArticleThe deepfake threat just got a little more personal
A two-hour conversation with an AI model is enough to create a fairly accurate image of a real person’s personality, according to researchers from Google and Stanford University. As part of a recent...
View ArticlePlacebo- versus Nocebo-Effekt: Die Psychologie hinter der Security Awareness
Während der Placebo-Effekt positive Erwartungshaltungen beschreibt, steht der Nocebo-Effekt für negative Erwartungen. Beides spielt bei den Security-Vorgaben eines Unternehmens bei den Mitarbeitenden...
View ArticleHow CISOs can forge the best relationships for cybersecurity investment
When it comes to securing cybersecurity investments there are many things at play. The key often lies in the CISO’s ability to build relationships with key stakeholders across the organization....
View ArticleThe biggest data breach fines, penalties, and settlements so far
Sizable fines assessed for data breaches in recent years suggest that regulators are getting more serious about cracking down on organizations that don’t properly protect consumer data. Hit with a $...
View ArticleRansomware-Bande erpresst Weininger Metall System
Die Weininger Metall System GmbH wird von einer Ransomware-Bande mit gestohlenen Daten erpresst. PeopleImages.com – Yuri A/ Shutterstock.com Industrieunternehmen sind angesichts ihrer wichtigen Rolle...
View ArticleCritical Mitel, Oracle flaws find active exploitation, CISA urges patching
Attackers are actively expoiting flaws in Mitel MiCollab flaws to gain unauthorized access to sensitive system files, the US Cybersecurity and Infrastructure Security Agency (CISA) has warned. On...
View ArticleDNA sequencer vulnerabilities signal firmware issues across medical device...
In highlighting vulnerabilities in a widely used DNA gene sequencing device, security researchers have brought further attention to the likely poor state of security in the medical device industry,...
View ArticleUN agency’s job application database breached, 42,000 records stolen
The International Civil Aviation Organization (ICAO) on Tuesday said that it is “actively investigating reports of a potential information security incident allegedly linked to a threat actor known...
View ArticleIvanti warns critical RCE flaw in Connect Secure exploited as zero-day
IT software provider Ivanti released patches Wednesday for its Connect Secure SSL VPN appliances to address two memory corruption vulnerabilities, one of which has already been exploited in the wild...
View ArticleSOAR buyer’s guide: 11 security orchestration, automation, and response...
Security orchestration, automation, and response (SOAR) has undergone a major transformation in the past few years. Features in each of the words in its description that were once exclusive to SOAR...
View Article