Quantcast
Browsing all 1594 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Mehrheit der Deutschen fürchtet sich vor Cyberangriffen

Viele Deutsche fürchten sich vor gezielten Cyberangriffen, die von Staaten ausgehen.Andrea Danti – Shutterstock.com Eine deutliche Mehrheit der Menschen in Deutschland hat Angst vor Cyberangriffen...

View Article


Hackers gain root access to Palo Alto firewalls through chained bugs

A high-severity authentication bypass vulnerability in Palo Alto Networks’ PAN-OS software, patched last week, is now being actively exploited by threat actors to gain root-level access to affected...

View Article


How to prevent AI-based data incidents

It’s every company’s nightmare: A competitor is targeting its own customers with targeted campaigns. And it’s doing it so precisely that it can’t be a coincidence. It’s reasonable to assume that the...

View Article

Russian cyberespionage groups target Signal users with fake group invites

Russian advanced persistent threat (APT) groups are increasingly launching phishing attacks aimed at tricking users of the Signal messaging app into giving attacker-controlled devices access to their...

View Article

CISO success story: Predicting cyber risk (accurately) is easier with this...

You wouldn’t expect a professional jazz musician to morph into a cybersecurity policy expert, but that’s the story of Ash Hunt (below), author of a groundbreaking paper on cyber-risk analysis. Thanks...

View Article


Image may be NSFW.
Clik here to view.

Der trügerische Komfort des Risikomanagements

Gefahrenmanagement statt Risikomanagement: Cybersicherheit erfordert Dringlichkeit und Entschlossenheit.Billion Photos – Shutterstock.com Herkömmliches Risikomanagement basiert auf...

View Article

Image may be NSFW.
Clik here to view.

Understanding OWASP’s Top 10 list of non-human identity critical risks

Verizon There are some very good reasons why non-human identities (NHI) have landed among the most-discussed cybersecurity topics in the last few years — it’s estimated that for every 1,000 human...

View Article

What is SIEM? Improving security posture through event log data

Introduction to SIEM Security information and event management software (SIEM) products have been an enduring part of enterprise software ever since the category was created back in 2005 by a couple...

View Article


Image may be NSFW.
Clik here to view.

Hackerangriff auf LUP-Kliniken: Täter haben Daten gestohlen

Krankenhäuser geraten immer öfter in das Visier von Cyberkriminellen. Jetzt hat es zwei Kliniken im Landkreis Ludwigslust-Parchim getroffen.Fah Studio 27 – Shutterstock.com Vor rund zwei Wochen hat es...

View Article


Mac users duped with FrigidStealer posing as browser updates

Hackers are seen dropping a new macOS infoStealer, FrigidStealer, on unsuspecting systems in a web inject campaign that uses fake browser updates to lure victims. Researchers at Proofpoint reported...

View Article

Image may be NSFW.
Clik here to view.

CISOs wollen Cloud-Security vorantreiben

Cloud-Security: CISOs setzen auf Application-Protection-Plattformen (CNAPP).Digitala World – Shutterstock.com 76 Prozent der deutschen CISOs planen in den kommenden 12 Monaten, ihre finanziellen...

View Article

Fake captcha attacks are increasing, say experts

Several cybersecurity firms have published alerts about threat actors fooling customer employees into downloading malware through fake captcha login verification pages. Captchas are those annoying...

View Article

Image may be NSFW.
Clik here to view.

Security-Infotainment: Die besten Hacker-Dokus

Sie fühlen sich leer ohne Security-Dashboard? Diese Dokumentationen überbrücken den Schmerz bis zum nächsten Arbeitstag. Foto: Gorodenkoff – shutterstock.comWenn Sie in Ihrer Profession als...

View Article


Managing the emotional toll cybersecurity incidents can take on your team

Cybersecurity professionals face significant mental health challenges from their work, and it’s no surprise why. They are responsible for maintaining the digital security of their organizations by...

View Article

Image may be NSFW.
Clik here to view.

Ransomware-Attacke auf Gesundheitsdienstleister

Die Ransomware-Gruppe Medusa will den britischen Gesundheitsdienstleister HCRG Care Group um mehr als 2.000 Daten erleichtert haben.Sasun Bughdaryan – Shutterstock.com Die Ransomware-Bande Medusa...

View Article


Firing of 130 CISA staff worries cybersecurity industry

The firing of upwards of 130 cybersecurity professionals at the US Cybersecurity and Infrastructure Security Agency (CISA) is a disaster for the US, but also for many of its allies that count on close...

View Article

Fight fire with fire: 3 major ways AI fuels your cybersecurity arsenal

A cyberattack on a UK-based energy firm used AI to mimic the CEO’s voice and tricked a staffer into transferring $243,000 to a fake account in 2019. A cyber espionage campaign in 2021 targeted...

View Article


Image may be NSFW.
Clik here to view.

Securing the backbone of enterprise generative AI

The rise of generative AI (genAI) over the past two years has driven a whirlwind of innovation and a massive surge in demand from enterprises worldwide to utilize this transformative technology....

View Article

How CISOs can sharpen their board pitch for IAM buy-in

In a time when 94% of companies have experienced an identity-related breach, many CISOs feel the urgency to strengthen identity and access management (IAM) across their organizations. In fact, a...

View Article

FBI and CISA warn about continuing attacks by Chinese ransomware group Ghost

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint advisory about the activities of a ransomware group from China dubbed...

View Article
Browsing all 1594 articles
Browse latest View live