Quantcast
Browsing all 1623 articles
Browse latest View live

Neuer EU-Plan für mehr Cybersicherheit im Gesundheitswesen

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2566052025.jpg?quality=50&strip=all 6178w,...

View Article


Image may be NSFW.
Clik here to view.

International agierende Internetbetrüger geschnappt

Insgesamt waren ca. 150 Polizeikräfte – davon 10 Polizeibeamte des Nürnberger Kriminalfachdezernats 5 – und zwei Staatsanwältinnen sowie zwei IT-Forensiker der ZCB in Deutschland, Rumänien und...

View Article


How do you unlock automation within IT security and IT operations?

The proliferation of endpoints in today’s enterprises is outpacing the ability of IT operations and security teams to cost-effectively manage increasingly complex environments.  Already stretched...

View Article

Millions of tunneling hosts are vulnerable to spoofing, DDoS attacks, say...

There are more than 4 million vulnerable hosts on the internet that accept unauthenticated traffic, say Belgian researchers, who warn that, unless action is taken by CISOs and network product...

View Article

Image may be NSFW.
Clik here to view.

Was ist ein Payload?

Ähnlich wie damals die griechischen Soldaten, die im Inneren des trojanischen Pferdes auf den passenden Zeitpunkt lauerten, werden Payloads zum Beispiel in vermeintlich harmlosen Dateianhängen...

View Article


EU’s DORA could further strain cybersecurity skills gap

Efforts spent in achieving compliance with the EU’s Digital Operational Resilience Act (DORA) are likely to pile further pressure on the already strained cybersecurity skills market. DORA, which comes...

View Article

Poor patching regime is opening businesses to serious problems

Vulnerability remediation is taking a severe hit as security teams are faced with fatigue from a growing number of publicly disclosed vulnerabilities. According to an analysis by S&P Global...

View Article

Image may be NSFW.
Clik here to view.

DORA-Umsetzung hält Banken-CISOs auf Trab

Finanzunternehmen müssen seit heute die neuen Regeln der EU-Verordnung DORA anwenden. Doch viele kämpfen noch immer mit der Umsetzung.SkazovD – Shutterstock.com Ab heute am 17. Januar 2025 sind alle...

View Article


US hits back against China’s Salt Typhoon group

The US is hitting back against the threat group, dubbed Salt Typhoon by Microsoft, which is allegedly behind recent cyber attacks against American telecommunications providers, as part of a wider...

View Article


Secure AI? Dream on, says AI red team

The group responsible for red teaming of over 100 generative AI products at Microsoft has concluded that the work of building safe and secure AI systems will never be complete. In a paper published...

View Article

Image may be NSFW.
Clik here to view.

Diese Security-Technologien haben ausgedient

Zeit für eine Frischzellenkur?JL_OFF | shutterstock.com Sicherheitsentscheidern steht eine ständig wachsende Auswahl von digitalen Tools zur Verfügung, die sie dabei unterstützen, Cyberattacken...

View Article

Midsize firms universally behind in slog toward DORA compliance

Beginning Friday, Jan. 17, all EU financial institutions are now required to operate in compliance with the Digital Operational Resilience Act (DORA). The EU directive aims to increase cybersecurity...

View Article

How organizations can secure their AI code

In 2023, the team at data extraction startup Reworkd was under tight deadlines. Investors pressured them to monetize the platform, and they needed to migrate everything from Next.js to Python/FastAPI....

View Article


Ridding your network of NTLM

Microsoft has hinted at a possible end to NTLM a few times, but with quite a few Windows 95 or 98 in use that do not support the alternative, Kerberos, it won’t be an easy job to do. There is the...

View Article

HPE’s sensitive data exposed in alleged IntelBroker hack

IntelBroker has struck again. This time, the notorious BreachForums bigwig, which has a long list of high-profile victims, including Europol, Cisco, and GE, has claimed to have breached IT giant...

View Article


Image may be NSFW.
Clik here to view.

Cyberangriff auf Bundesdruckerei-Tochter

2476561975 TippaPatt – Shutterstock.com Die D-Trust GmbH fungiert als Trustcenter der Bundesdruckerei. Nach eigenen Angaben stellte das Unternehmen am 13. Januar fest, dass das Antragsportal für...

View Article

Image may be NSFW.
Clik here to view.

So geht Tabletop Exercise

Übung macht den Incident-Response-Meister. Foto: GaudiLab – shutterstock.comDie Bedrohungslage entschärft sich bekanntermaßen nie – umso wichtiger ist es, dass Sicherheitsentscheider und ihre Teams...

View Article


EU to take aim at healthcare cyber threat

The European Commission is presenting an action plan to strengthen cybersecurity in healthcare as one of its key priorities in the first 100 days of the commission’s new mandate. The healthcare sector...

View Article

7 top cybersecurity projects for 2025

As 2025 dawns, CISOs face the grim reality that the battle against cyberattackers never ends. Strong and carefully planned cybersecurity projects are the best way to stay a step ahead of attackers and...

View Article

ChatGPT API flaws could allow DDoS, prompt injection attacks

OpenAI-owned ChatGPT might have a vulnerability that could allow threat actors to launch distributed denial of service (DDoS) attacks on unsuspecting targets.   According to a discovery made by German...

View Article
Browsing all 1623 articles
Browse latest View live