Behörden schalten große Cybercrime-Foren ab
width="4171" height="2346" sizes="(max-width: 4171px) 100vw, 4171px">Die weltweit größte Handelsplattformen für Cybercrime im Internet ist offline.Cheryl-Annette Parker – shutterstock.com Die...
View ArticleVMware offers fixes to severe vulnerabilities in VMware Aria
VMware has fixed multiple high-severity vulnerabilities affecting its cloud management platform (CMP), VMware Aria, which could allow attackers to steal sensitive credentials from the virtualization...
View ArticleHow CISOs can fight burnout and extend their careers
By putting in over a decade as chief information security officer for the Commonwealth of Pennsylvania, Erik Avakian not only managed to outlast three successive governors but also far exceeded the...
View ArticleBackdoor in Chinese-made healthcare monitoring device leaks patient data
US federal agencies have warned that a popular Chinese-made patient monitor device used in medical settings across the US and Europe has a built-in backdoor that leaks patient data to an unauthorized...
View ArticleDownload the Agentic AI Enterprise Spotlight
Download the February 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World.
View ArticleCybertrends 2025: KI-Cyberwaffen, Zero Days und gefördertes Chaos
Im Jahr 2025 werden staatlich gefördertes Chaos, KI-gesteuerte Waffen und die verschwimmenden Grenzen zwischen zivilen und militärischen Zielen den Cyberbereich bestimmen.Billion Photos –...
View ArticleThe CISO’s role in advancing innovation in cybersecurity
Cybersecurity leaders have an advantage when it comes to innovation given their front seat facing new and old threats. That is why many CISOs are playing an active role in shaping emerging solutions,...
View Article39% of IT leaders fear major incident due to excessive workloads
Enterprise security operations teams find themselves stretched thin and contending with an escalating cyber threat landscape today. Many are understaffed and underfunded, leaving CISOs on edge about...
View ArticleHacker nutzen Google Gemini zur Verstärkung von Angriffen
Lesen Sie, wie Hacker den KI-Dienst Gemini von Google aktuell nutzen. Sadi-Santos – Shutterstock.com Von Regierungen unterstützte Bedrohungsakteure nutzen bereits den KI-Dienst Gemini von Google, um...
View ArticleSchutz von Onlinekonten: Starkes Passwort reicht nicht aus
Auch starke Passwörter bieten keinen ausreichenden Schutz vor Cyberattacken. ParinPix – Shutterstock Cyberkriminelle verschicken betrügerische Nachrichten per E-Mail oder Messenger. Sie geben sich zum...
View ArticleSophos finalizes $859 million acquisition of rival Secureworks
Sophos has announced the completion of its $859 million acquisition of Secureworks. The deal makes Sophos one of the largest providers of managed detection and response (MDR) services, with the...
View ArticleAMD patches microcode security holes after accidental early disclosure
AMD on Monday issued two patches for severe microcode security flaws, defects that AMD said “could lead to the loss of Secure Encrypted Virtualization (SEV) protection.” The bugs were inadvertently...
View Article7 tips for improving cybersecurity ROI
When it comes to cybersecurity investments, smart money is directed toward initiatives that deliver the greatest protection at the lowest possible cost. But what appears to be a straightforward...
View ArticleMusk’s DOGE effort could spread malware, expose US systems to threat actors
Over the past 10 days, an astonishing series of actions by Elon Musk via his Department of Government Efficiency (DOGE) project has elevated the cybersecurity risk of some of the most sensitive...
View ArticleHackers impersonate DeepSeek to distribute malware
To make things worse than they already are for DeepSeek, hackers are found flooding the Python Package Index (PyPI) repository with fake DeepSeek packages carrying malicious payloads. According to a...
View Article7 Tipps zur Verbesserung des ROI für Cybersicherheit
Lesen Sie, wie Sie mehr aus Ihren aktuellen Investitionen in Cybersicherheit herausholen können.wertinio – Shutterstock.com Wenn es um Investitionen in die Cybersicherheit geht, wird das Geld in...
View ArticleIt pays to know how your cybersecurity stacks up
Like all other business leaders, chief information security officers (CISOs) could find themselves on the unemployment line if something on their watch goes seriously sideways. But what if CISOs...
View ArticleAbandoned AWS S3 buckets open door to remote code execution, supply-chain...
Code references to nonexistent cloud assets continue to pose significant security risks, and the problem is only growing. Recent research identified approximately 150 AWS S3 storage buckets once used...
View ArticleAWS tightens default security on Redshift
Amazon’s security improvements for its AWS Redshift managed data warehouse service are welcome additions, says an expert. Loris Degioanni, chief technology officer at Sysdig, told CSO that AWS’s...
View ArticleNew trojan hijacks Linux and IoT devices
There’s a new trojan on the block, one that specifically targets network appliances and internet of things (IoT) devices running the open-source Linux operating system. FortiGuard Labs has identified...
View Article