Microsoft sues overseas threat actor group over abuse of OpenAI service
Microsoft has filed suit against 10 unnamed people (“Does”), who are apparently operating overseas, for misuse of its Azure OpenAI platform, asking the Eastern District of Virginia federal court for...
View ArticleDORA steht vor der Tür
srcset="https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_1942670248.jpg?quality=50&strip=all 12500w,...
View ArticleAct fast to blunt a new ransomware attack on AWS S3 buckets
CISOs are being warned to make sure employees take extra steps to protect their AWS access keys after word that a threat actor is using stolen login passwords for ransomware attacks. The target is...
View ArticleGen AI strategies put CISOs in a stressful bind
Senior executive perceptions on the promise of generative AI are proving to be a siren song for many CISOs. According to a recent survey from NTT Data, 89% of C-suite executives “are very concerned...
View ArticlePhishing-Klickrate massiv gestiegen
Im Vergleich zum Vorjahr hat die Phishing-Klickrate im Jahr 2024 stark zugenommen. janews – Shutterstock.com Seit Jahren investieren Unternehmen in Awareness-Programme, um ihre Mitarbeiter darin zu...
View ArticleBiden White House to go all out in final, sweeping cybersecurity order
The Biden administration’s last cybersecurity action is a comprehensive and ambitious 50-page executive order (EO) entitled “Strengthening and Promoting Innovation in the Nation’s Cybersecurity” that...
View ArticleBeware cybersecurity tech that’s past its prime — 5 areas to check or retire
Cybersecurity leaders can choose from an ever-expanding list of digital tools to help them ward off attacks and, based on market projections, they’re implementing plenty of those options. Gartner...
View ArticleFortinet confirms zero-day flaw used in attacks against its firewalls
Fortinet has confirmed the existence of a critical authentication bypass vulnerability in specific versions of FortiOS firewalls and FortiProxy secure web gateways. The flaw has been exploited in the...
View ArticleInternational effort erases PlugX malware from thousands of Windows computers
The US has again taken court-approved action to remove malware from privately-held internet-connected computers across the country, part of an effort by a number of countries to combat infections of a...
View ArticleStop wasting money on ineffective threat intelligence: 5 mistakes to avoid
Strong capabilities in cyber threat intelligence (CTI) can help take a cybersecurity program to the next level on many different fronts. When organizations choose quality sources of threat...
View ArticleThe CFO may be the CISO’s most important business ally
CISOs frequently encounter inherent conflicts with business colleagues in their day-to-day responsibilities. In many ways, this is the nature of setting security policies for an organization. But the...
View ArticleDiese Unternehmen hat’s schon erwischt
Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind.Roman Samborskyi | shutterstock.com Sie denken, Ihre Sicherheitsmaßnahmen können Sie langfristig vor...
View ArticleCISA unveils ‘Secure by Demand’ guidelines to bolster OT security
The US Cybersecurity and Infrastructure Security Agency (CISA), along with its international cybersecurity allies, has unveiled the “Secure by Demand” guidelines to safeguard operational technology...
View ArticleCisco’s homegrown AI to help enterprises navigate AI adoption
As the world rushes to integrate AI into all aspects of enterprise applications, there’s a pressing need to secure data-absorbing AI systems from malicious interferences. To achieve that, Cisco has...
View ArticlePerfide Ransomware-Attacke gegen AWS-Nutzer
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2390933631.jpg?quality=50&strip=all 4750w,...
View ArticleDie Top 10 Geschäftsrisiken in Deutschland 2025
Cyberangriffe zählen nach wie vor zu den größten Geschäftsrisiken.Andrey_Popov – shutterstock.com Kriminelle Hacker, Naturkatastrophen, politische Risiken und der Klimawandel bereiten Unternehmen...
View ArticleCISA warns second BeyondTrust vulnerability also exploited in the wild
The US Cybersecurity and Infrastructure Security Agency (CISA) has added to its catalog of known exploited vulnerabilities a second vulnerability by BeyondTrust, which was patched in December. The...
View ArticleCybersecurity hiring is deeply flawed, demoralizing, and needs to be fixed
When people think about starting a new job, words like “exciting,” “motivating,” and “rewarding” often come to mind. The search for a new role represents an opportunity to embrace fresh challenges,...
View ArticleSIEM buyer’s guide: Top 15 security information and event management tools —...
Security information and event management (SIEM) is a blue-collar tool for network security professionals. There’s nothing remotely glamorous about auditing, reviewing, and managing event logs, but...
View ArticleFTC orders GoDaddy to fix its infosec practices
Web-hosting giant GoDaddy has been called out by the US Federal Trade Commission (FTC) for its lax security practices, since at least January 2018, with an order to immediately implement a tighter...
View Article