Neuer EU-Plan für mehr Cybersicherheit im Gesundheitswesen
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2566052025.jpg?quality=50&strip=all 6178w,...
View ArticleInternational agierende Internetbetrüger geschnappt
Insgesamt waren ca. 150 Polizeikräfte – davon 10 Polizeibeamte des Nürnberger Kriminalfachdezernats 5 – und zwei Staatsanwältinnen sowie zwei IT-Forensiker der ZCB in Deutschland, Rumänien und...
View ArticleHow do you unlock automation within IT security and IT operations?
The proliferation of endpoints in today’s enterprises is outpacing the ability of IT operations and security teams to cost-effectively manage increasingly complex environments. Already stretched...
View ArticleMillions of tunneling hosts are vulnerable to spoofing, DDoS attacks, say...
There are more than 4 million vulnerable hosts on the internet that accept unauthenticated traffic, say Belgian researchers, who warn that, unless action is taken by CISOs and network product...
View ArticleWas ist ein Payload?
Ähnlich wie damals die griechischen Soldaten, die im Inneren des trojanischen Pferdes auf den passenden Zeitpunkt lauerten, werden Payloads zum Beispiel in vermeintlich harmlosen Dateianhängen...
View ArticleEU’s DORA could further strain cybersecurity skills gap
Efforts spent in achieving compliance with the EU’s Digital Operational Resilience Act (DORA) are likely to pile further pressure on the already strained cybersecurity skills market. DORA, which comes...
View ArticlePoor patching regime is opening businesses to serious problems
Vulnerability remediation is taking a severe hit as security teams are faced with fatigue from a growing number of publicly disclosed vulnerabilities. According to an analysis by S&P Global...
View ArticleDORA-Umsetzung hält Banken-CISOs auf Trab
Finanzunternehmen müssen seit heute die neuen Regeln der EU-Verordnung DORA anwenden. Doch viele kämpfen noch immer mit der Umsetzung.SkazovD – Shutterstock.com Ab heute am 17. Januar 2025 sind alle...
View ArticleUS hits back against China’s Salt Typhoon group
The US is hitting back against the threat group, dubbed Salt Typhoon by Microsoft, which is allegedly behind recent cyber attacks against American telecommunications providers, as part of a wider...
View ArticleSecure AI? Dream on, says AI red team
The group responsible for red teaming of over 100 generative AI products at Microsoft has concluded that the work of building safe and secure AI systems will never be complete. In a paper published...
View ArticleDiese Security-Technologien haben ausgedient
Zeit für eine Frischzellenkur?JL_OFF | shutterstock.com Sicherheitsentscheidern steht eine ständig wachsende Auswahl von digitalen Tools zur Verfügung, die sie dabei unterstützen, Cyberattacken...
View ArticleMidsize firms universally behind in slog toward DORA compliance
Beginning Friday, Jan. 17, all EU financial institutions are now required to operate in compliance with the Digital Operational Resilience Act (DORA). The EU directive aims to increase cybersecurity...
View ArticleHow organizations can secure their AI code
In 2023, the team at data extraction startup Reworkd was under tight deadlines. Investors pressured them to monetize the platform, and they needed to migrate everything from Next.js to Python/FastAPI....
View ArticleRidding your network of NTLM
Microsoft has hinted at a possible end to NTLM a few times, but with quite a few Windows 95 or 98 in use that do not support the alternative, Kerberos, it won’t be an easy job to do. There is the...
View ArticleHPE’s sensitive data exposed in alleged IntelBroker hack
IntelBroker has struck again. This time, the notorious BreachForums bigwig, which has a long list of high-profile victims, including Europol, Cisco, and GE, has claimed to have breached IT giant...
View ArticleCyberangriff auf Bundesdruckerei-Tochter
2476561975 TippaPatt – Shutterstock.com Die D-Trust GmbH fungiert als Trustcenter der Bundesdruckerei. Nach eigenen Angaben stellte das Unternehmen am 13. Januar fest, dass das Antragsportal für...
View ArticleSo geht Tabletop Exercise
Übung macht den Incident-Response-Meister. Foto: GaudiLab – shutterstock.comDie Bedrohungslage entschärft sich bekanntermaßen nie – umso wichtiger ist es, dass Sicherheitsentscheider und ihre Teams...
View ArticleEU to take aim at healthcare cyber threat
The European Commission is presenting an action plan to strengthen cybersecurity in healthcare as one of its key priorities in the first 100 days of the commission’s new mandate. The healthcare sector...
View Article7 top cybersecurity projects for 2025
As 2025 dawns, CISOs face the grim reality that the battle against cyberattackers never ends. Strong and carefully planned cybersecurity projects are the best way to stay a step ahead of attackers and...
View ArticleChatGPT API flaws could allow DDoS, prompt injection attacks
OpenAI-owned ChatGPT might have a vulnerability that could allow threat actors to launch distributed denial of service (DDoS) attacks on unsuspecting targets. According to a discovery made by German...
View Article