Quantcast
Browsing all 1594 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Neues Mirai-Botnet zielt auf Industrierouter

Das Botnet Gayfemboy basiert auf der Malware Mirai und zielt auf Industrierouter auf der ganzen Welt.Jaiz Anuar – Shutterstock.com Security-Analysen zufolge verbreitet sich das auf der berüchtigten...

View Article


China-linked hackers target Japan’s national security and high-tech industries

Japan’s National Police Agency (NPA) and the National Center of Incident Readiness and Strategy for Cybersecurity (NISC) have exposed a long-running cyber espionage campaign, “MirrorFace” (also known...

View Article


Image may be NSFW.
Clik here to view.

Neue Hinweise zur angeblichen Ransomware-Attacke auf Atos

Tobias Arhelger – Shutterstock.com Die Ransomware-Bande Space Bears veröffentlichte Ende Dezember 2024 einen Hinweis auf gestohlene Daten von Atos. Der französische IT-Dienstleister teilte jedoch...

View Article

SonicWall firewall hit with critical authentication bypass vulnerability

SonicWall is warning customers of a severe vulnerability in its SonicOS SSLVPN with high exploitability that remote attackers could use to bypass authentication. The bug is an improper authentication...

View Article

New Mirai botnet targets industrial routers

According to security analysis, the Gayfemboy botnet, based on the notorious Mirai malware, is currently spreading around the world. Researchers from Chainxin X Lab found that cybercriminals have been...

View Article


Ivanti zero-day exploited by APT group that previously targeted Connect...

Researchers from Google’s Mandiant division believe the critical remote code execution vulnerability patched on Wednesday by software vendor Ivanti has been exploited since mid-December by a Chinese...

View Article

Legitimate PoC exploited to spread information stealer

A recently copied and abused open source proof of concept (PoC) exploit from a reputable security company, aimed at helping threat researchers, is the latest example of the novel tactics hackers will...

View Article

Image may be NSFW.
Clik here to view.

6 Risk-Assessment-Frameworks im Vergleich

Mit dem richtigen Framework lassen sich Risiken besser ergründen.FOTOGRIN – shutterstock.com Für viele Geschäftsprozesse ist Technologie inzwischen unverzichtbar. Deshalb zählt diese auch zu den...

View Article


SEC rule confusion continues to put CISOs in a bind a year after a major...

Confusion around when and how to report cybersecurity breaches continues to plague companies a year after revised US Securities and Exchange Commission (SEC) cybersecurity breach reporting rules came...

View Article


Malware targets Mac users by using Apple’s security tool

A variant of the Banshee macOS infostealer was seen duping detection systems with new string encryption copied from Apple’s in-house algorithm. A Check Point research, which caught the variant after...

View Article

Software-Lücke bei KigaRoo: Millionen Kita-Daten offen im Netz

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2188578487.jpg?quality=50&strip=all 6048w,...

View Article

2025 Cybersecurity and AI Predictions

The cybersecurity and AI landscape continues to evolve at a breathtaking pace, and with it, the associated risks. Snowballing cybercrime costs are compounded by a cybersecurity workforce gap of nearly...

View Article

Image may be NSFW.
Clik here to view.

Was ist Social Engineering?

Mit Social-Engineering-Techniken manipulieren Cyberkriminelle die menschliche Psyche. Lesen Sie, wie das funktioniert und wie Sie sich schützen können. Foto: sp3n – shutterstock.comSelbst wenn Sie bei...

View Article


Payback-CISO: „Vorbereitung ist das A und O“

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?quality=50&strip=all 6016w,...

View Article

Phishing click rates tripled in 2024 despite user training

For years organizations have invested in security awareness training programs to teach employees how to spot and report phishing attempts. Despite those efforts, enterprise users were three times as...

View Article


Image may be NSFW.
Clik here to view.

CISOs embrace rise in prominence — with broader business authority

It’s a familiar refrain: As cybersecurity has become a core business priority, it is no longer a siloed operation, and the responsibilities of CISOs have grown, giving them greater prominence within...

View Article

Biden’s final push: Using AI to bolster cybersecurity standards

In a decisive move to strengthen national cybersecurity, President Joe Biden is poised to sign an executive order imposing stringent security standards for federal agencies and contractors. Scheduled...

View Article


Sicherheitsmängel gefährden DNA-Sequenziergeräte

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?quality=50&strip=all 5283w,...

View Article

US attacks ransomware supply chain with indictment of three cryptocurrency...

The US Department of Justice indicted three Russian citizens on Friday for allegedly running services that helped criminals launder cryptocurrency; the services are suspected to have been used to hide...

View Article

Hotel chain ditches Google search for DuckDuckGo — ‘subjected to fraud...

At the end of 2021, Nordic Choice Hotels, now renamed Strawberry, was hit by a major ransomware attack that paralyzed operations for just over a week. Everything had to be done manually, says Martin...

View Article
Browsing all 1594 articles
Browse latest View live