CISA warns of critical, high-risk flaws in ICS products from four vendors
The US Cybersecurity and Infrastructure Security Alliance has issued advisories for 11 critical and high-risk vulnerabilities in industrial control systems (ICS) products from several manufacturers....
View ArticleUnknown threat actor targeting Juniper routers with backdoor: Report
Network administrators using routers from Juniper Networks are being urged to scan for possible compromise after the discovery that an unknown threat actor has been installing a backdoor in customer...
View Article6 Risk-Assessment-Frameworks im Vergleich
Mit dem richtigen Framework lassen sich Risiken besser ergründen.FOTOGRIN – shutterstock.com Für viele Geschäftsprozesse ist Technologie inzwischen unverzichtbar. Deshalb zählt diese auch zu den...
View ArticleWant to be an effective cybersecurity leader? Learn to excel at change...
If there’s one thing that’s inevitable in cybersecurity, it’s change. Ever-evolving technology requires new protections, threats seem to multiply and morph on a daily basis, and even the humblest...
View ArticleCISOs are moving closer to the board — but budget hurdles remain
In recent years, CISOs have often felt that their board of directors did not take them seriously. This key issue for cybersecurity, however, is turning around, with 82% of CISOs now reporting directly...
View ArticleNew phishing campaign targets users in Poland and Germany
An ongoing phishing campaign, presumably by an advanced persistent threat (APT) actor, is seen dropping a new backdoor on victim systems enabling stealthy C2 operations. The backdoor, which Cisco’s...
View ArticleDownload our security information and event management (SIEM) tools buyer’s...
From the editors of CSO, this enterprise buyer’s guide helps IT security staff understand what SIEM can do for their organizations and how to choose the right solution.
View ArticleRansomware: Schwere Versäumnisse in deutschen Unternehmen
Laut einer Umfrage benötigen deutsche Unternehmen im Vergleich zu anderen Ländern mehr Zeit und Geld, um Ransomware-Attacken einzudämmen.HL12 – Shutterstock.com Eine weltweite Umfrage des...
View ArticleThreat actors using Google Gemini to amplify attacks: Report
Government-backed threat actors are currently using Google’s Gemini AI service to expand their capabilities, part of an effort by hackers of all skill levels to leverage publicly-available generative...
View ArticleNew Mirai botnet fires off DDoS attacks via compromised Mitel phones,...
A third variant of the Mirai-based Aquabot malware is apparently taking over Mitel phones to create a remote-controlled botnet that can fire off distributed denial of service (DDoS) attacks. Dubbed...
View Article5 teure Threat-Intelligence-Fehler
Fehlgeleitete Threat-Intelligence-Programme lassen (nicht nur) Ihr Security-Budget schmelzen.Vitalii Stock | shutterstock.com Ausgeprägte Fähigkeiten im Bereich Threat Intelligence (TI) können dazu...
View ArticleAmerican CISOs should prepare now for the coming connected-vehicle tech bans
In a groundbreaking shift in automotive supply chain regulation, the White House announced a new rule issued by the Commerce Department’s Bureau of Industry and Security (BIS) a week before the end of...
View ArticleWhat is Magecart? How this hacker group steals payment card data
Magecart definition Magecart is a consortium of malicious hacker groups who target online shopping cart systems, usually the Magento system, to steal customer payment card information. This is known...
View ArticleFBI takes down Cracked.to and Nulled.to in a global law enforcement operation
FBI has taken down Cracked.to, Nulled.to, and a few other hack sites cybercriminals use for dropping stolen credentials, software cracks, and remote desktop hacks in a coordinated law enforcement...
View ArticleDeepSeek leaks one million sensitive records in a major data breach
A New York-based cybersecurity firm, Wiz, has uncovered a critical security lapse at DeepSeek, a rising Chinese AI startup, revealing a cache of sensitive data openly accessible on the internet....
View ArticleHackerangriff auf deutschen Reiseanbieter
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2495795811.jpg?quality=50&strip=all 5184w,...
View ArticleNorth Korean hackers impersonated recruiters to steal credentials from over...
The Lazarus group, North Korea’s main state-sponsored cyberespionage group, infected more than 1,500 systems around the world in a months-long campaign during which they extracted development...
View ArticleBedrohungs-Monitoring: Die 10 besten Tools zur Darknet-Überwachung
Lesen Sie, worauf es beim Darknet-Monitoring ankommt und welche Tools dafür am besten geeignet sind. Foto: sashk0 – shutterstock.comDas Dark Web ist ein Ort, von dem jeder CISO hofft, dass die Daten...
View ArticleThe CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have...
View ArticleHow law enforcement agents gain access to encrypted devices
Accessing data on encrypted devices might seem like something out of a hacker or spy movie, but for law enforcement, it’s a very real challenge. The issue is of relevance to CISOs and other security...
View Article