Quantcast
Browsing all 1594 articles
Browse latest View live

CISOs: Stop trying to do the lawyer’s job

There’s a joke that’s been floating around boardrooms for years: “What’s the difference between lawyers and engineers? Lawyers don’t think they’re engineers.” This light-hearted jab highlights a...

View Article


Image may be NSFW.
Clik here to view.

So killen Sie NTLM

Netzwerksicherheit und NTLM gehen nicht gut zusammen.PeopleImages.com – Yuri A | shutterstock.com Im Jahr 1991 beendete Microsoft seine Partnerschaft mit IBM und damit auch die gemeinsame...

View Article


Nearly 10% of employee gen AI prompts include sensitive data

Gen AI data leaks from employees are an enterprise nightmare in the making. According to a recent report on gen AI data leakage from Harmonic, 8.5% of employee prompts to popular LLMs included...

View Article

Image may be NSFW.
Clik here to view.

CIO Cloud Summit: Best Practices von Anwendern für Anwender

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/02/CIO_Cloud_Summit.jpg?quality=50&strip=all 1682w,...

View Article

Fortifying cyber security: What does secure look like in 2025?

The evolving cybersecurity landscape has increased security pressures for IT leaders. With the World Economic Forum estimating, the global cost of cybercrime is projected to reach $10.5trillion...

View Article


Why cyber hygiene remains critical in the era of AI-driven threats

Cyber-attacks are an assumed inevitable for businesses today. As companies increasingly handle large amounts of valuable data, safeguarding operations has never been more important. Now, half (50%) of...

View Article

Hackers breach Microsoft IIS services using Cityworks RCE bug

Hackers are exploiting a high-severity remote code execution (RCE) flaw in Cityworks deployments — a GIS-centric asset and work order management software —  to execute codes on a customers’ Microsoft...

View Article

Image may be NSFW.
Clik here to view.

Datenleck durch GenAI-Nutzung

Viele Mitarbeiter teilen sensible Unternehmensdaten, wenn sie generative KI-Apps anwenden.Owlie Productions – Shutterstock.com Laut einem aktuellen Bericht über Gen-AI-Datenlecks von Harmonic...

View Article


Image may be NSFW.
Clik here to view.

Die besten DAST- & SAST-Tools

Tools für Dynamic und Static Application Security Testing helfen Entwicklern, ihren Quellcode zu härten. Wir zeigen Ihnen die besten Tools zu diesem Zweck.Chim | shutterstock.com Die...

View Article


Top 5 ways attackers use generative AI to exploit your systems

Artificial intelligence is revolutionizing the technology industry and this is equally true for the cybercrime ecosystem, as cybercriminals are increasingly leveraging generative AI to improve their...

View Article

WTF? Why the cybersecurity sector is overrun with acronyms

Back when Elon Musk was best known for founding SpaceX and Tesla, not as one of Donald Trump’s most trusted advisors, he issued a stern warning to his employees about their overuse of acronyms. In...

View Article

Apple issues emergency patches to contain an ‘extremely sophisticated attack’...

Apple has rolled out emergency security patches after discovering that an “extremely sophisticated attack” exploited a flaw in its USB Restricted Mode, potentially targeting specific individuals. The...

View Article

Why security leaders must ensure they have a recovery plan for Active...

With mass digitisation and the rising prevalence of global, highly distributed enterprise, cybersecurity leaders must ensure they can combat Active Directory (AD) attacks. Enterprises rely on their AD...

View Article


Over 12,000 KerioControl firewalls remain prone to RCE attacks amid active...

Businesses around the globe have over 12,000 vulnerable instances of the GFI KerioControl application — a unified threat management (UTM) firewall software designed for small and mid-sized...

View Article

Image may be NSFW.
Clik here to view.

Hackerangriff auf LUP-Kliniken

Krankenhäuser geraten immer öfter in das Visier von Cyberkriminellen. Jetzt hat es zwei Kliniken im Landkreis Ludwigslust-Parchim getroffen.Fah Studio 27 – Shutterstock.com Schon wieder hat es einen...

View Article


CSO Award and Hall of Fame Nominations Open Now

Has your organization pioneered groundbreaking security initiatives that delivered real business value? If so, now is the time to showcase your achievements and gain industry-wide recognition. As...

View Article

World Economic Forum Annual Meeting 2025: Takeaways, reflections, and...

In January, leaders from around the world gathered at the 55th Annual World Economic Forum (WEF) Meeting in Davos-Klosters, Switzerland. This annual event brings together influential voices from...

View Article


Image may be NSFW.
Clik here to view.

Hacker bringen falsche Rechnungen in Umlauf

Hacker haben eine Handelsfirma in Mecklenburg-Vorpommern angegriffen und in deren Namen Rechnungen verschickt. PeopleImages.com – Yuri A/ Shutterstock.com Wie die Regionalzeitung Nordkurier berichtet,...

View Article

How to communicate clearly (and legally) during a cybersecurity crisis

What do a CISO handling a data breach and a 10-year-old who just accidentally broke his neighbor’s window have in common? Each has a difficult choice about what to communicate next – and how. As more...

View Article

Authorities seize Phobos and 8Base ransomware servers, arrest 4 suspects

Law enforcement agencies from 14 countries collaborated in an investigation against the related Phobos and 8Base ransomware operations, arresting four suspects and seizing 27 servers, including the...

View Article
Browsing all 1594 articles
Browse latest View live