Mehrheit der Deutschen fürchtet sich vor Cyberangriffen
Viele Deutsche fürchten sich vor gezielten Cyberangriffen, die von Staaten ausgehen.Andrea Danti – Shutterstock.com Eine deutliche Mehrheit der Menschen in Deutschland hat Angst vor Cyberangriffen...
View ArticleHackers gain root access to Palo Alto firewalls through chained bugs
A high-severity authentication bypass vulnerability in Palo Alto Networks’ PAN-OS software, patched last week, is now being actively exploited by threat actors to gain root-level access to affected...
View ArticleHow to prevent AI-based data incidents
It’s every company’s nightmare: A competitor is targeting its own customers with targeted campaigns. And it’s doing it so precisely that it can’t be a coincidence. It’s reasonable to assume that the...
View ArticleRussian cyberespionage groups target Signal users with fake group invites
Russian advanced persistent threat (APT) groups are increasingly launching phishing attacks aimed at tricking users of the Signal messaging app into giving attacker-controlled devices access to their...
View ArticleCISO success story: Predicting cyber risk (accurately) is easier with this...
You wouldn’t expect a professional jazz musician to morph into a cybersecurity policy expert, but that’s the story of Ash Hunt (below), author of a groundbreaking paper on cyber-risk analysis. Thanks...
View ArticleDer trügerische Komfort des Risikomanagements
Gefahrenmanagement statt Risikomanagement: Cybersicherheit erfordert Dringlichkeit und Entschlossenheit.Billion Photos – Shutterstock.com Herkömmliches Risikomanagement basiert auf...
View ArticleUnderstanding OWASP’s Top 10 list of non-human identity critical risks
Verizon There are some very good reasons why non-human identities (NHI) have landed among the most-discussed cybersecurity topics in the last few years — it’s estimated that for every 1,000 human...
View ArticleWhat is SIEM? Improving security posture through event log data
Introduction to SIEM Security information and event management software (SIEM) products have been an enduring part of enterprise software ever since the category was created back in 2005 by a couple...
View ArticleHackerangriff auf LUP-Kliniken: Täter haben Daten gestohlen
Krankenhäuser geraten immer öfter in das Visier von Cyberkriminellen. Jetzt hat es zwei Kliniken im Landkreis Ludwigslust-Parchim getroffen.Fah Studio 27 – Shutterstock.com Vor rund zwei Wochen hat es...
View ArticleMac users duped with FrigidStealer posing as browser updates
Hackers are seen dropping a new macOS infoStealer, FrigidStealer, on unsuspecting systems in a web inject campaign that uses fake browser updates to lure victims. Researchers at Proofpoint reported...
View ArticleCISOs wollen Cloud-Security vorantreiben
Cloud-Security: CISOs setzen auf Application-Protection-Plattformen (CNAPP).Digitala World – Shutterstock.com 76 Prozent der deutschen CISOs planen in den kommenden 12 Monaten, ihre finanziellen...
View ArticleFake captcha attacks are increasing, say experts
Several cybersecurity firms have published alerts about threat actors fooling customer employees into downloading malware through fake captcha login verification pages. Captchas are those annoying...
View ArticleSecurity-Infotainment: Die besten Hacker-Dokus
Sie fühlen sich leer ohne Security-Dashboard? Diese Dokumentationen überbrücken den Schmerz bis zum nächsten Arbeitstag. Foto: Gorodenkoff – shutterstock.comWenn Sie in Ihrer Profession als...
View ArticleManaging the emotional toll cybersecurity incidents can take on your team
Cybersecurity professionals face significant mental health challenges from their work, and it’s no surprise why. They are responsible for maintaining the digital security of their organizations by...
View ArticleRansomware-Attacke auf Gesundheitsdienstleister
Die Ransomware-Gruppe Medusa will den britischen Gesundheitsdienstleister HCRG Care Group um mehr als 2.000 Daten erleichtert haben.Sasun Bughdaryan – Shutterstock.com Die Ransomware-Bande Medusa...
View ArticleFiring of 130 CISA staff worries cybersecurity industry
The firing of upwards of 130 cybersecurity professionals at the US Cybersecurity and Infrastructure Security Agency (CISA) is a disaster for the US, but also for many of its allies that count on close...
View ArticleFight fire with fire: 3 major ways AI fuels your cybersecurity arsenal
A cyberattack on a UK-based energy firm used AI to mimic the CEO’s voice and tricked a staffer into transferring $243,000 to a fake account in 2019. A cyber espionage campaign in 2021 targeted...
View ArticleSecuring the backbone of enterprise generative AI
The rise of generative AI (genAI) over the past two years has driven a whirlwind of innovation and a massive surge in demand from enterprises worldwide to utilize this transformative technology....
View ArticleHow CISOs can sharpen their board pitch for IAM buy-in
In a time when 94% of companies have experienced an identity-related breach, many CISOs feel the urgency to strengthen identity and access management (IAM) across their organizations. In fact, a...
View ArticleFBI and CISA warn about continuing attacks by Chinese ransomware group Ghost
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint advisory about the activities of a ransomware group from China dubbed...
View Article