Prävention gegen Black Basta
Ein lückenloser Grundschutz ist im Kampf gegen Ransomware die halbe Miete.ImageFlow – Shutterstock.com Seit ihrem ersten Auftreten im Jahr 2022 müssen sich immer mehr Unternehmen mit den aggressiven...
View ArticleGDPR fines hit €1.2 billion in 2024 on 8.3% more breach reports
Corporation violations of GDPR rules resulted in total fines of €1.2 billion in 2024, according to a report from international law firm DLA Piper. This sum represents a 33% decrease compared to 2023,...
View ArticleTricking the bad guys: realism and robustness are crucial to deception...
Longtime cybersecurity practitioners might recall the early guidance manuals published by the National Security Agency (NSA) in the 1980s and 1990s known as the “Rainbow Series,” so named because each...
View ArticleSonicWall’s Secure Mobile Access appliance faces zero-day attacks
A critical bug in SonicWall’s remote access gateway, Secure Mobile Access (SMA1000), is likely being used in zero-day attacks, allowing remote code execution (RCE) by unauthenticated actors. The...
View ArticleCISOs rücken näher an den Vorstand
Ein gutes Verhältnis zwischen CISO und Vorstand hat viele Vorteile. Golden Dayz – Shutterstock.com In den vergangenen Jahren haben sich CISOs häufig nicht von ihrem Vorstand ernst genommen gefühlt....
View ArticleDOJ indicts North Korean conspirators for remote IT work scheme
The US Department of Justice this week announced that it had indicted two North Korean nationals and three other men, accusing them of participating in a conspiracy designed to trick US companies into...
View ArticleCybersicherheitsvorschriften: So erfüllen Sie Ihre Compliance-Anforderungen
Mit der Zunahme von Cyberbedrohungen steigt auch die Zahl der Compliance-Rahmenwerke. So können CISOs diese Herausforderung bewältigen. Foto: Dapitart – shutterstock.comDie Anforderungen von...
View ArticleCybersecurity needs women — and it needs to treat them better
The participation of women in cybersecurity is vital, a non-negotiable proposition. Forget any current handwringing over diversity and equity; it’s fundamental that the contribution of women to the...
View ArticleCyberangriff auf Bundesdruckerei-Tochter
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?quality=50&strip=all 6235w,...
View ArticleCISOs’ top 12 cybersecurity priorities for 2025
Security chief Andrew Obadiaru’s to-do list for the upcoming year will be familiar to CISOs everywhere: advance a zero-trust architecture in the organization; strengthen identity and access controls...
View ArticleA pickle in Meta’s LLM code could allow RCE attacks
Meta’s large language model (LLM) framework, Llama, suffers a typical open-source coding oversight, potentially allowing arbitrary code execution on servers leading to resource theft, data breaches,...
View ArticleIT-Angriff auf das British Museum
Kurios: Ein ehemaliger Techniker hat im British Museum Systeme abgeschaltet.Mistervlad – Shutterstock.com Das weltbekannte British Museum bleibt nach einem mutmaßlichen IT-Angriff eines ehemaligen...
View ArticleNew ransomware group Funksec is quickly gaining traction
Threat reports for December showed a newcomer to the ransomware-as-a-service (RaaS) landscape quickly climbing the ranks. Called Funksec, this group appears to be leveraging generative AI in its...
View ArticleThe cybersecurity skills gap reality: We need to face the challenge of...
The cybersecurity skills shortage remains a controversial topic. Research from ISC2 states that the current global workforce of cybersecurity professionals stands at 5.5 million, but the workforce...
View ArticleUS takes aim at healthcare cybersecurity with proposed HIPAA changes
The US Department of Health and Human Services (HHS) has launched a consultation on stricter rules for the safeguarding of electronic health records. The proposed revamp of security rules covered by...
View ArticleDeepSeek hit by cyberattack and outage amid breakthrough success
Chinese AI startup DeepSeek said it was hit by a cyberattack, prompting the company to restrict user registrations and manage website outages as demand for its AI assistant soared. According to the...
View ArticleiPhone users targeted in Apple’s first zero-day exploit in 2025
Apple iPhone users were targeted for privilege escalation in the zero-day exploitation of a use-after-free vulnerability affecting Apple’s Core Media framework. “A malicious application may be able to...
View ArticleDeepSeek AI angegriffen?
Neue Benutzer können sich derzeit nicht registrieren, um DeepSeeks virales KI-Modell R1 auszutesten. Laut dem chinesischen Startup ist eine Cyberattacke der Grund. Shutterstock / Robert Way DeepSeek...
View ArticleNeue Ransomware-Gruppe Funksec profitiert von LLMs
Die neue Ransomware-Gruppe Funksec scheint bei der Entwicklung ihrer Malware durch die Nutzung von generativer KI zu profitieren.KDdesign_photo_video – Shutterstock.com Bedrohungsanalysen der...
View Article5 ways boards can improve their cybersecurity governance
As chairman of the board for Cinturion Group, Richard Marshall is intimately involved in ensuring the security of the fiber optic network his company is constructing from India through the Middle East...
View Article