Neues Mirai-Botnet zielt auf Industrierouter
Das Botnet Gayfemboy basiert auf der Malware Mirai und zielt auf Industrierouter auf der ganzen Welt.Jaiz Anuar – Shutterstock.com Security-Analysen zufolge verbreitet sich das auf der berüchtigten...
View ArticleChina-linked hackers target Japan’s national security and high-tech industries
Japan’s National Police Agency (NPA) and the National Center of Incident Readiness and Strategy for Cybersecurity (NISC) have exposed a long-running cyber espionage campaign, “MirrorFace” (also known...
View ArticleNeue Hinweise zur angeblichen Ransomware-Attacke auf Atos
Tobias Arhelger – Shutterstock.com Die Ransomware-Bande Space Bears veröffentlichte Ende Dezember 2024 einen Hinweis auf gestohlene Daten von Atos. Der französische IT-Dienstleister teilte jedoch...
View ArticleSonicWall firewall hit with critical authentication bypass vulnerability
SonicWall is warning customers of a severe vulnerability in its SonicOS SSLVPN with high exploitability that remote attackers could use to bypass authentication. The bug is an improper authentication...
View ArticleNew Mirai botnet targets industrial routers
According to security analysis, the Gayfemboy botnet, based on the notorious Mirai malware, is currently spreading around the world. Researchers from Chainxin X Lab found that cybercriminals have been...
View ArticleIvanti zero-day exploited by APT group that previously targeted Connect...
Researchers from Google’s Mandiant division believe the critical remote code execution vulnerability patched on Wednesday by software vendor Ivanti has been exploited since mid-December by a Chinese...
View ArticleLegitimate PoC exploited to spread information stealer
A recently copied and abused open source proof of concept (PoC) exploit from a reputable security company, aimed at helping threat researchers, is the latest example of the novel tactics hackers will...
View Article6 Risk-Assessment-Frameworks im Vergleich
Mit dem richtigen Framework lassen sich Risiken besser ergründen.FOTOGRIN – shutterstock.com Für viele Geschäftsprozesse ist Technologie inzwischen unverzichtbar. Deshalb zählt diese auch zu den...
View ArticleSEC rule confusion continues to put CISOs in a bind a year after a major...
Confusion around when and how to report cybersecurity breaches continues to plague companies a year after revised US Securities and Exchange Commission (SEC) cybersecurity breach reporting rules came...
View ArticleMalware targets Mac users by using Apple’s security tool
A variant of the Banshee macOS infostealer was seen duping detection systems with new string encryption copied from Apple’s in-house algorithm. A Check Point research, which caught the variant after...
View ArticleSoftware-Lücke bei KigaRoo: Millionen Kita-Daten offen im Netz
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2188578487.jpg?quality=50&strip=all 6048w,...
View Article2025 Cybersecurity and AI Predictions
The cybersecurity and AI landscape continues to evolve at a breathtaking pace, and with it, the associated risks. Snowballing cybercrime costs are compounded by a cybersecurity workforce gap of nearly...
View ArticleWas ist Social Engineering?
Mit Social-Engineering-Techniken manipulieren Cyberkriminelle die menschliche Psyche. Lesen Sie, wie das funktioniert und wie Sie sich schützen können. Foto: sp3n – shutterstock.comSelbst wenn Sie bei...
View ArticlePayback-CISO: „Vorbereitung ist das A und O“
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?quality=50&strip=all 6016w,...
View ArticlePhishing click rates tripled in 2024 despite user training
For years organizations have invested in security awareness training programs to teach employees how to spot and report phishing attempts. Despite those efforts, enterprise users were three times as...
View ArticleCISOs embrace rise in prominence — with broader business authority
It’s a familiar refrain: As cybersecurity has become a core business priority, it is no longer a siloed operation, and the responsibilities of CISOs have grown, giving them greater prominence within...
View ArticleBiden’s final push: Using AI to bolster cybersecurity standards
In a decisive move to strengthen national cybersecurity, President Joe Biden is poised to sign an executive order imposing stringent security standards for federal agencies and contractors. Scheduled...
View ArticleSicherheitsmängel gefährden DNA-Sequenziergeräte
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?quality=50&strip=all 5283w,...
View ArticleUS attacks ransomware supply chain with indictment of three cryptocurrency...
The US Department of Justice indicted three Russian citizens on Friday for allegedly running services that helped criminals launder cryptocurrency; the services are suspected to have been used to hide...
View ArticleHotel chain ditches Google search for DuckDuckGo — ‘subjected to fraud...
At the end of 2021, Nordic Choice Hotels, now renamed Strawberry, was hit by a major ransomware attack that paralyzed operations for just over a week. Everything had to be done manually, says Martin...
View Article