whoAMI name confusion attacks can expose AWS accounts to malicious code...
Thousands of active AWS accounts are vulnerable to a cloud image name confusion attack that could allow attackers to execute codes within those accounts. According to DataDog research, vulnerable...
View ArticleHacker attackieren Bundeswehr-Universität
Die Studierenden an der Universität der Bundeswehr dürften wenig begeistert darüber sein, dass Hacker ihre Daten abgegriffen haben.Universität der Bundeswehr Hacker haben die Universität der...
View ArticlePalo Alto Networks firewall bug being exploited by threat actors: Report
Admins with firewalls from Palo Alto Networks should make sure the devices are fully patched and the management interface blocked from open internet access after the discovery this week of a zero-day...
View ArticleCISO success story: How LA County trains (and retrains) workers to fight...
It cost neighboring San Bernardino County $1.1 million to resolve a ransomware attack on its sheriff’s department earlier this year. Jeff Aguilar, the chief information security officer for...
View Article4 Wege aus der Security-Akronymhölle
Gefangen im Buchstabensud?mikeledray | shutterstock.com Bevor Elon Musk zum Trump-Sidekick mutierte, wurde er in erster Linie als visionärer Entrepreneur wahrgenommen. Damals, im Jahr 2010, ließ er...
View ArticleSoftware Bill of Material umsetzen: Die besten SBOM-Tools
Nur wenn Sie wissen, was drinsteckt, können Sie sich sicher sein, dass alles mit rechten Dingen zugeht. Das gilt für Fast Food wie für Software. Foto: Geka – shutterstock.comUm Software abzusichern,...
View ArticleHow to evaluate and mitigate risks to the global supply chain
Enterprise security leaders face mounting pressure to protect their global IT supply chains against threat actors and an increasingly complex regulatory and geopolitical landscape. Recent events —...
View ArticleRansomware gangs extort victims 17 hours after intrusion on average
Ransomware gangs are operating much more quickly than before, leaving less time for organizations to detect them. According to analysis of ransomware incidents over the past year, the average...
View ArticleDiese Unternehmen hat’s schon erwischt
Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind.Roman Samborskyi | shutterstock.com Sie denken, Ihre Sicherheitsmaßnahmen können Sie langfristig vor...
View ArticleWebsites der Bayerischen Staatsregierung angegriffen
Bayern: Staatskanzlei und das Staatsministerium für Digitales waren das Ziel einer DDoS-Attacke.Vlyaks – shutterstock.com Die Staatsregierung in Bayern ist Ziel eines Hackerangriffs geworden. Man gehe...
View ArticleNico Lange: „Cybersicherheit ist eine Frage der Verteidigung“
Munich Security Conference Live Studio powered by APCO in Munich, Germany on February 15, 2025. (Photo by Christopher Pike / christopherpike.com) APCO. Welches sind laut dem Münchner Sicherheitsindex...
View ArticleNew family of data-stealing malware leverages Microsoft Outlook
CISOs have yet another attack vector to worry about with the discovery of a new family of data-stealing malware that uses Microsoft Outlook as a communications channel through abusing the Graph API,...
View ArticlePassword managers under increasing threat as infostealers triple and adapt
Security watchers warn of a three-fold increase in malware that targets credential stores, such as password managers and browser-stored login data. The study by Picus Security, which was based on...
View ArticleHow CISOs can rebuild trust after a security incident
When incident response plans cover the aftermath, they typically focus solely on technical matters, such as root cause analysis or upgrading systems. The problem with this approach is that breaches...
View ArticleXCSSET macOS malware reappears with new attack strategies, Microsoft sounds...
Microsoft has warned that a new variant of XCSSET malware is actively targeting macOS users, marking the first update to the malware since 2022. This latest version has been observed in limited...
View ArticleRussian malware discovered with Telegram hacks for C2 operations
Hackers have been found deploying an unfinished Russian malware, written in Golang, that leverages Telegram as its command-and-control (C2) channel. Netskope Threat Labs, the research wing of the...
View ArticleRansomware-Banden geben Opfern immer weniger Zeit
width="2494" height="1402" sizes="(max-width: 2494px) 100vw, 2494px"> Ransomware-Gruppen haben den Zeitraum bis zur Lösegeldübergabe immer mehr verkürzt. Zephyr_p – shutterstock.com Laut einer...
View ArticleOpenSSH fixes flaws that enable man-in-the-middle, DoS attacks
OpenSSH, the most widely used tool for remotely managing Linux and BSD systems, received patches for two vulnerabilities. One of the flaws could allow attackers to perform a man-in-the-middle attack...
View ArticleCustomer Identity & Access Management: Die besten CIAM-Tools
Wir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt.Jackie Niam | shutterstock.com Customer Identity & Access Management (CIAM) bildet eine...
View ArticleThink being CISO of a cybersecurity vendor is easy? Think again
When people in this industry hear that a CISO is working at a cybersecurity vendor, it can trigger a number of assumptions — many of them misguided. There’s a stereotype that the role isn’t “real”...
View Article