Quantcast
Browsing all 1606 articles
Browse latest View live

Microsoft sues overseas threat actor group over abuse of OpenAI service

Microsoft has filed suit against 10 unnamed people (“Does”), who are apparently operating overseas, for misuse of its Azure OpenAI platform, asking the Eastern District of Virginia federal court for...

View Article


DORA steht vor der Tür

srcset="https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_1942670248.jpg?quality=50&strip=all 12500w,...

View Article


Act fast to blunt a new ransomware attack on AWS S3 buckets

CISOs are being warned to make sure employees take extra steps to protect their AWS access keys after word that a threat actor is using stolen login passwords for ransomware attacks. The target is...

View Article

Gen AI strategies put CISOs in a stressful bind

Senior executive perceptions on the promise of generative AI are proving to be a siren song for many CISOs. According to a recent survey from NTT Data, 89% of C-suite executives “are very concerned...

View Article

Image may be NSFW.
Clik here to view.

Phishing-Klickrate massiv gestiegen

Im Vergleich zum Vorjahr hat die Phishing-Klickrate im Jahr 2024 stark zugenommen. janews – Shutterstock.com Seit Jahren investieren Unternehmen in Awareness-Programme, um ihre Mitarbeiter darin zu...

View Article


Biden White House to go all out in final, sweeping cybersecurity order

The Biden administration’s last cybersecurity action is a comprehensive and ambitious 50-page executive order (EO) entitled “Strengthening and Promoting Innovation in the Nation’s Cybersecurity” that...

View Article

Beware cybersecurity tech that’s past its prime — 5 areas to check or retire

Cybersecurity leaders can choose from an ever-expanding list of digital tools to help them ward off attacks and, based on market projections, they’re implementing plenty of those options. Gartner...

View Article

Fortinet confirms zero-day flaw used in attacks against its firewalls

Fortinet has confirmed the existence of a critical authentication bypass vulnerability in specific versions of FortiOS firewalls and FortiProxy secure web gateways. The flaw has been exploited in the...

View Article


International effort erases PlugX malware from thousands of Windows computers

The US has again taken court-approved action to remove malware from privately-held internet-connected computers across the country, part of an effort by a number of countries to combat infections of a...

View Article


Stop wasting money on ineffective threat intelligence: 5 mistakes to avoid

Strong capabilities in cyber threat intelligence (CTI) can help take a cybersecurity program to the next level on many different fronts. When organizations choose quality sources of threat...

View Article

The CFO may be the CISO’s most important business ally

CISOs frequently encounter inherent conflicts with business colleagues in their day-to-day responsibilities. In many ways, this is the nature of setting security policies for an organization. But the...

View Article

Image may be NSFW.
Clik here to view.

Diese Unternehmen hat’s schon erwischt

Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind.Roman Samborskyi | shutterstock.com Sie denken, Ihre Sicherheitsmaßnahmen können Sie langfristig vor...

View Article

CISA unveils ‘Secure by Demand’ guidelines to bolster OT security

The US Cybersecurity and Infrastructure Security Agency (CISA), along with its international cybersecurity allies, has unveiled the “Secure by Demand” guidelines to safeguard operational technology...

View Article


Cisco’s homegrown AI to help enterprises navigate AI adoption

As the world rushes to integrate AI into all aspects of enterprise applications, there’s a pressing need to secure data-absorbing AI systems from malicious interferences. To achieve that, Cisco has...

View Article

Perfide Ransomware-Attacke gegen AWS-Nutzer

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2390933631.jpg?quality=50&strip=all 4750w,...

View Article


Image may be NSFW.
Clik here to view.

Die Top 10 Geschäftsrisiken in Deutschland 2025

Cyberangriffe zählen nach wie vor zu den größten Geschäftsrisiken.Andrey_Popov – shutterstock.com Kriminelle Hacker, Naturkatastrophen, politische Risiken und der Klimawandel bereiten Unternehmen...

View Article

CISA warns second BeyondTrust vulnerability also exploited in the wild

The US Cybersecurity and Infrastructure Security Agency (CISA) has added to its catalog of known exploited vulnerabilities a second vulnerability by BeyondTrust, which was patched in December. The...

View Article


Cybersecurity hiring is deeply flawed, demoralizing, and needs to be fixed

When people think about starting a new job, words like “exciting,” “motivating,” and “rewarding” often come to mind. The search for a new role represents an opportunity to embrace fresh challenges,...

View Article

SIEM buyer’s guide: Top 15 security information and event management tools —...

Security information and event management (SIEM) is a blue-collar tool for network security professionals. There’s nothing remotely glamorous about auditing, reviewing, and managing event logs, but...

View Article

FTC orders GoDaddy to fix its infosec practices

Web-hosting giant GoDaddy has been called out by the US Federal Trade Commission (FTC) for its lax security practices, since at least January 2018, with an order to immediately implement a tighter...

View Article
Browsing all 1606 articles
Browse latest View live