Quantcast
Browsing all 1614 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Prävention gegen Black Basta

Ein lückenloser Grundschutz ist im Kampf gegen Ransomware die halbe Miete.ImageFlow – Shutterstock.com Seit ihrem ersten Auftreten im Jahr 2022 müssen sich immer mehr Unternehmen mit den aggressiven...

View Article


GDPR fines hit €1.2 billion in 2024 on 8.3% more breach reports

Corporation violations of GDPR rules resulted in total fines of €1.2 billion in 2024, according to a report from international law firm DLA Piper. This sum represents a 33% decrease compared to 2023,...

View Article


Tricking the bad guys: realism and robustness are crucial to deception...

Longtime cybersecurity practitioners might recall the early guidance manuals published by the National Security Agency (NSA) in the 1980s and 1990s known as the “Rainbow Series,” so named because each...

View Article

SonicWall’s Secure Mobile Access appliance faces zero-day attacks

A critical bug in SonicWall’s remote access gateway, Secure Mobile Access (SMA1000), is likely being used in zero-day attacks, allowing remote code execution (RCE) by unauthenticated actors. The...

View Article

Image may be NSFW.
Clik here to view.

CISOs rücken näher an den Vorstand

Ein gutes Verhältnis zwischen CISO und Vorstand hat viele Vorteile. Golden Dayz – Shutterstock.com In den vergangenen Jahren haben sich CISOs häufig nicht von ihrem Vorstand ernst genommen gefühlt....

View Article


DOJ indicts North Korean conspirators for remote IT work scheme

The US Department of Justice this week announced that it had indicted two North Korean nationals and three other men, accusing them of participating in a conspiracy designed to trick US companies into...

View Article

Image may be NSFW.
Clik here to view.

Cybersicherheitsvorschriften: So erfüllen Sie Ihre Compliance-Anforderungen

Mit der Zunahme von Cyberbedrohungen steigt auch die Zahl der Compliance-Rahmenwerke. So können CISOs diese Herausforderung bewältigen. Foto: Dapitart – shutterstock.comDie Anforderungen von...

View Article

Cybersecurity needs women — and it needs to treat them better

The participation of women in cybersecurity is vital, a non-negotiable proposition. Forget any current handwringing over diversity and equity; it’s fundamental that the contribution of women to the...

View Article


Cyberangriff auf Bundesdruckerei-Tochter

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?quality=50&strip=all 6235w,...

View Article


Image may be NSFW.
Clik here to view.

CISOs’ top 12 cybersecurity priorities for 2025

Security chief Andrew Obadiaru’s to-do list for the upcoming year will be familiar to CISOs everywhere: advance a zero-trust architecture in the organization; strengthen identity and access controls...

View Article

A pickle in Meta’s LLM code could allow RCE attacks

Meta’s large language model (LLM) framework, Llama, suffers a typical open-source coding oversight, potentially allowing arbitrary code execution on servers leading to resource theft, data breaches,...

View Article

Image may be NSFW.
Clik here to view.

IT-Angriff auf das British Museum

Kurios: Ein ehemaliger Techniker hat im British Museum Systeme abgeschaltet.Mistervlad – Shutterstock.com Das weltbekannte British Museum bleibt nach einem mutmaßlichen IT-Angriff eines ehemaligen...

View Article

New ransomware group Funksec is quickly gaining traction

Threat reports for December showed a newcomer to the ransomware-as-a-service (RaaS) landscape quickly climbing the ranks. Called Funksec, this group appears to be leveraging generative AI in its...

View Article


The cybersecurity skills gap reality: We need to face the challenge of...

The cybersecurity skills shortage remains a controversial topic. Research from ISC2 states that the current global workforce of cybersecurity professionals stands at 5.5 million, but the workforce...

View Article

US takes aim at healthcare cybersecurity with proposed HIPAA changes

The US Department of Health and Human Services (HHS) has launched a consultation on stricter rules for the safeguarding of electronic health records. The proposed revamp of security rules covered by...

View Article


DeepSeek hit by cyberattack and outage amid breakthrough success

Chinese AI startup DeepSeek said it was hit by a cyberattack, prompting the company to restrict user registrations and manage website outages as demand for its AI assistant soared. According to the...

View Article

iPhone users targeted in Apple’s first zero-day exploit in 2025

Apple iPhone users were targeted for privilege escalation in the zero-day exploitation of a use-after-free vulnerability affecting Apple’s Core Media framework. “A malicious application may be able to...

View Article


Image may be NSFW.
Clik here to view.

DeepSeek AI angegriffen?

Neue Benutzer können sich derzeit nicht registrieren, um DeepSeeks virales KI-Modell R1 auszutesten. Laut dem chinesischen Startup ist eine Cyberattacke der Grund. Shutterstock / Robert Way DeepSeek...

View Article

Image may be NSFW.
Clik here to view.

Neue Ransomware-Gruppe Funksec profitiert von LLMs

Die neue Ransomware-Gruppe Funksec scheint bei der Entwicklung ihrer Malware durch die Nutzung von generativer KI zu profitieren.KDdesign_photo_video – Shutterstock.com Bedrohungsanalysen der...

View Article

5 ways boards can improve their cybersecurity governance

As chairman of the board for Cinturion Group, Richard Marshall is intimately involved in ensuring the security of the fiber optic network his company is constructing from India through the Middle East...

View Article
Browsing all 1614 articles
Browse latest View live