Quantcast
Browsing all 1623 articles
Browse latest View live

whoAMI name confusion attacks can expose AWS accounts to malicious code...

Thousands of active AWS accounts are vulnerable to a cloud image name confusion attack that could allow attackers to execute codes within those accounts. According to DataDog research, vulnerable...

View Article


Image may be NSFW.
Clik here to view.

Hacker attackieren Bundeswehr-Universität

Die Studierenden an der Universität der Bundeswehr dürften wenig begeistert darüber sein, dass Hacker ihre Daten abgegriffen haben.Universität der Bundeswehr Hacker haben die Universität der...

View Article


Palo Alto Networks firewall bug being exploited by threat actors: Report

Admins with firewalls from Palo Alto Networks should make sure the devices are fully patched and the management interface blocked from open internet access after the discovery this week of a zero-day...

View Article

CISO success story: How LA County trains (and retrains) workers to fight...

It cost neighboring San Bernardino County $1.1 million to resolve a ransomware attack on its sheriff’s department earlier this year. Jeff Aguilar, the chief information security officer for...

View Article

Image may be NSFW.
Clik here to view.

4 Wege aus der Security-Akronymhölle

Gefangen im Buchstabensud?mikeledray | shutterstock.com Bevor Elon Musk zum Trump-Sidekick mutierte, wurde er in erster Linie als visionärer Entrepreneur wahrgenommen. Damals, im Jahr 2010, ließ er...

View Article


Image may be NSFW.
Clik here to view.

Software Bill of Material umsetzen: Die besten SBOM-Tools

Nur wenn Sie wissen, was drinsteckt, können Sie sich sicher sein, dass alles mit rechten Dingen zugeht. Das gilt für Fast Food wie für Software. Foto: Geka – shutterstock.comUm Software abzusichern,...

View Article

How to evaluate and mitigate risks to the global supply chain

Enterprise security leaders face mounting pressure to protect their global IT supply chains against threat actors and an increasingly complex regulatory and geopolitical landscape. Recent events —...

View Article

Ransomware gangs extort victims 17 hours after intrusion on average

Ransomware gangs are operating much more quickly than before, leaving less time for organizations to detect them. According to analysis of ransomware incidents over the past year, the average...

View Article


Image may be NSFW.
Clik here to view.

Diese Unternehmen hat’s schon erwischt

Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind.Roman Samborskyi | shutterstock.com Sie denken, Ihre Sicherheitsmaßnahmen können Sie langfristig vor...

View Article


Image may be NSFW.
Clik here to view.

Websites der Bayerischen Staatsregierung angegriffen

Bayern: Staatskanzlei und das Staatsministerium für Digitales waren das Ziel einer DDoS-Attacke.Vlyaks – shutterstock.com Die Staatsregierung in Bayern ist Ziel eines Hackerangriffs geworden. Man gehe...

View Article

Image may be NSFW.
Clik here to view.

Nico Lange: „Cybersicherheit ist eine Frage der Verteidigung“

Munich Security Conference Live Studio powered by APCO in Munich, Germany on February 15, 2025. (Photo by Christopher Pike / christopherpike.com) APCO. Welches sind laut dem Münchner Sicherheitsindex...

View Article

New family of data-stealing malware leverages Microsoft Outlook

CISOs have yet another attack vector to worry about with the discovery of a new family of data-stealing malware that uses Microsoft Outlook as a communications channel through abusing the Graph API,...

View Article

Password managers under increasing threat as infostealers triple and adapt

Security watchers warn of a three-fold increase in malware that targets credential stores, such as password managers and browser-stored login data. The study by Picus Security, which was based on...

View Article


How CISOs can rebuild trust after a security incident

When incident response plans cover the aftermath, they typically focus solely on technical matters, such as root cause analysis or upgrading systems. The problem with this approach is that breaches...

View Article

XCSSET macOS malware reappears with new attack strategies, Microsoft sounds...

Microsoft has warned that a new variant of XCSSET malware is actively targeting macOS users, marking the first update to the malware since 2022. This latest version has been observed in limited...

View Article


Russian malware discovered with Telegram hacks for C2 operations

Hackers have been found deploying an unfinished Russian malware, written in Golang, that leverages Telegram as its command-and-control (C2) channel. Netskope Threat Labs, the research wing of the...

View Article

Ransomware-Banden geben Opfern immer weniger Zeit

width="2494" height="1402" sizes="(max-width: 2494px) 100vw, 2494px"> Ransomware-Gruppen haben den Zeitraum bis zur Lösegeldübergabe immer mehr verkürzt. Zephyr_p – shutterstock.com Laut einer...

View Article


OpenSSH fixes flaws that enable man-in-the-middle, DoS attacks

OpenSSH, the most widely used tool for remotely managing Linux and BSD systems, received patches for two vulnerabilities. One of the flaws could allow attackers to perform a man-in-the-middle attack...

View Article

Image may be NSFW.
Clik here to view.

Customer Identity & Access Management: Die besten CIAM-Tools

Wir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt.Jackie Niam | shutterstock.com Customer Identity & Access Management (CIAM) bildet eine...

View Article

Think being CISO of a cybersecurity vendor is easy? Think again

When people in this industry hear that a CISO is working at a cybersecurity vendor, it can trigger a number of assumptions — many of them misguided. There’s a stereotype that the role isn’t “real”...

View Article
Browsing all 1623 articles
Browse latest View live