CISOs: Stop trying to do the lawyer’s job
There’s a joke that’s been floating around boardrooms for years: “What’s the difference between lawyers and engineers? Lawyers don’t think they’re engineers.” This light-hearted jab highlights a...
View ArticleSo killen Sie NTLM
Netzwerksicherheit und NTLM gehen nicht gut zusammen.PeopleImages.com – Yuri A | shutterstock.com Im Jahr 1991 beendete Microsoft seine Partnerschaft mit IBM und damit auch die gemeinsame...
View ArticleNearly 10% of employee gen AI prompts include sensitive data
Gen AI data leaks from employees are an enterprise nightmare in the making. According to a recent report on gen AI data leakage from Harmonic, 8.5% of employee prompts to popular LLMs included...
View ArticleCIO Cloud Summit: Best Practices von Anwendern für Anwender
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/02/CIO_Cloud_Summit.jpg?quality=50&strip=all 1682w,...
View ArticleFortifying cyber security: What does secure look like in 2025?
The evolving cybersecurity landscape has increased security pressures for IT leaders. With the World Economic Forum estimating, the global cost of cybercrime is projected to reach $10.5trillion...
View ArticleWhy cyber hygiene remains critical in the era of AI-driven threats
Cyber-attacks are an assumed inevitable for businesses today. As companies increasingly handle large amounts of valuable data, safeguarding operations has never been more important. Now, half (50%) of...
View ArticleHackers breach Microsoft IIS services using Cityworks RCE bug
Hackers are exploiting a high-severity remote code execution (RCE) flaw in Cityworks deployments — a GIS-centric asset and work order management software — to execute codes on a customers’ Microsoft...
View ArticleDatenleck durch GenAI-Nutzung
Viele Mitarbeiter teilen sensible Unternehmensdaten, wenn sie generative KI-Apps anwenden.Owlie Productions – Shutterstock.com Laut einem aktuellen Bericht über Gen-AI-Datenlecks von Harmonic...
View ArticleDie besten DAST- & SAST-Tools
Tools für Dynamic und Static Application Security Testing helfen Entwicklern, ihren Quellcode zu härten. Wir zeigen Ihnen die besten Tools zu diesem Zweck.Chim | shutterstock.com Die...
View ArticleTop 5 ways attackers use generative AI to exploit your systems
Artificial intelligence is revolutionizing the technology industry and this is equally true for the cybercrime ecosystem, as cybercriminals are increasingly leveraging generative AI to improve their...
View ArticleWTF? Why the cybersecurity sector is overrun with acronyms
Back when Elon Musk was best known for founding SpaceX and Tesla, not as one of Donald Trump’s most trusted advisors, he issued a stern warning to his employees about their overuse of acronyms. In...
View ArticleApple issues emergency patches to contain an ‘extremely sophisticated attack’...
Apple has rolled out emergency security patches after discovering that an “extremely sophisticated attack” exploited a flaw in its USB Restricted Mode, potentially targeting specific individuals. The...
View ArticleWhy security leaders must ensure they have a recovery plan for Active...
With mass digitisation and the rising prevalence of global, highly distributed enterprise, cybersecurity leaders must ensure they can combat Active Directory (AD) attacks. Enterprises rely on their AD...
View ArticleOver 12,000 KerioControl firewalls remain prone to RCE attacks amid active...
Businesses around the globe have over 12,000 vulnerable instances of the GFI KerioControl application — a unified threat management (UTM) firewall software designed for small and mid-sized...
View ArticleHackerangriff auf LUP-Kliniken
Krankenhäuser geraten immer öfter in das Visier von Cyberkriminellen. Jetzt hat es zwei Kliniken im Landkreis Ludwigslust-Parchim getroffen.Fah Studio 27 – Shutterstock.com Schon wieder hat es einen...
View ArticleCSO Award and Hall of Fame Nominations Open Now
Has your organization pioneered groundbreaking security initiatives that delivered real business value? If so, now is the time to showcase your achievements and gain industry-wide recognition. As...
View ArticleWorld Economic Forum Annual Meeting 2025: Takeaways, reflections, and...
In January, leaders from around the world gathered at the 55th Annual World Economic Forum (WEF) Meeting in Davos-Klosters, Switzerland. This annual event brings together influential voices from...
View ArticleHacker bringen falsche Rechnungen in Umlauf
Hacker haben eine Handelsfirma in Mecklenburg-Vorpommern angegriffen und in deren Namen Rechnungen verschickt. PeopleImages.com – Yuri A/ Shutterstock.com Wie die Regionalzeitung Nordkurier berichtet,...
View ArticleHow to communicate clearly (and legally) during a cybersecurity crisis
What do a CISO handling a data breach and a 10-year-old who just accidentally broke his neighbor’s window have in common? Each has a difficult choice about what to communicate next – and how. As more...
View ArticleAuthorities seize Phobos and 8Base ransomware servers, arrest 4 suspects
Law enforcement agencies from 14 countries collaborated in an investigation against the related Phobos and 8Base ransomware operations, arresting four suspects and seizing 27 servers, including the...
View Article