Quantcast
Channel: Ivanti warns customers of new critical flaw exploited in the wild | CSO Online
Browsing all 1593 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Mit MXDR gegen den Fachkräftemangel

Mit dem Einsatz von MXDR können Unternehmen ihr IT-Security-Team durch Experten erweitern und deren Expertise nutzen.G Data IT-Sicherheit ist für Unternehmen von entscheidender Bedeutung, um die...

View Article


Australia bans the use of Kaspersky products by government entities

The Secretary of the Department of Home Affairs issued on Friday a mandatory direction under the Protective Security Policy Framework (PSPF) to government entities requiring all to prevent the...

View Article


Strategic? Functional? Tactical? Which type of CISO are you?

When executives at a startup asked security leader George Gerchow to advise them on selecting a CISO, Gerchow recommended finding a security chief who had the skills to scale a security program,...

View Article

AI can kill banks: Cybersecurity’s disinformation gap

The British research organization Say No To Disinfo has simulated an AI-driven disinformation campaign in cooperation with communications specialists Fenimore Harper. As part of the campaign, 500 bank...

View Article

Bybit’s $1.5B hack linked to North Korea’s Lazarus group

An independent investigation into the $1.5 billion hack suffered by the Bybit cryptocurrency exchange on Friday has revealed connections to the infamous Lazarus group. A day after the attack was...

View Article


Image may be NSFW.
Clik here to view.

CIO Cloud Summit: Best Practices von Anwendern für Anwender

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/02/CIO_Cloud_Summit.jpg?quality=50&strip=all 1682w,...

View Article

Image may be NSFW.
Clik here to view.

Deutscher IT-Dienstleister im Visier von Ransomware-Angreifern

Die Hackerbande Akira soll Daten von InSyst gestohlen haben.Quality Pixel – Shutterstock.com Der IT-Dienstleister InSyst wurde offenbar Ziel einer Ransomware-Attacke. Die Ransomware-Gruppe Akira fügte...

View Article

Image may be NSFW.
Clik here to view.

Security Awareness Trainings: Schulungen richtig managen

Lesen Sie, welche Aspekte besonders entscheidend sind, damit Ihr Security Awareness Training erfolgreich ist. Foto: nialowwa – shutterstock.comStudien wie die von Verizon oder IBM zeigen immer wieder...

View Article


DOGE’s US worker purge has created a spike in insider risk

We talk a good deal about insider risk, how it evolves from threats within an organization, and how to get ahead of its escalation by being proactive and dealing with situations as they arise, well...

View Article


Image may be NSFW.
Clik here to view.

CIO des Jahres 2025 – Wettbewerb startet

Siegerinnen und Sieger des vergangenen Jahres jubeln über ihre CIO des Jahres Awards. Machen Sie mit und bewerben Sie sich – dann stehen Sie vielleicht im Oktober 2025 auf der großen Gala-Bühne und...

View Article

Image may be NSFW.
Clik here to view.

Krypto-Rekordraubzug von Nordkorea gesteuert?

Beim Angriff auf die Kryptobörse Bybit wurden Ethereum-Token im Wert von (derzeit) rund 1,5 Milliarden Dollar gestohlen.Bits And Splits | shutterstock.com Die (gemessen am Handelsvolumen) weltweit...

View Article

How to create an effective incident response plan

When a company experiences a major IT systems outage — such as from a cybersecurity incident — it’s essentially out of business for however long the downtime lasts. That’s why having an effective...

View Article

Image may be NSFW.
Clik here to view.

Stürmer Maschinen von Ransomware-Attacke getroffen

Die Ransomware-Bande Lynx erpresst den Großhändler Stürmer Maschinen mit gestohlenen Daten.DC Studio – Shutterstock.com Die Ransomware-Bande Lynx hat den Maschinengroßhändler Stürmer Maschinen...

View Article


Critical deserialization bugs in Adobe, Oracle software actively exploited,...

CISA is warning Adobe and Oracle customers about in-the-wild exploitation of critical vulnerabilities affecting the services of these leading enterprise software providers. The US cybersecurity...

View Article

Geopolitical tensions fuel surge in OT and ICS cyberattacks

Attacks against operational technology (OT) networks are on the rise, fueled by geopolitical tensions and conflicts, as OT security fast becomes a mainstream concern. Two new threat groups emerged in...

View Article


What CISOs need from the board: Mutual respect on expectations

There has been an extremely strong focus of late on organizational boards’ concerns about cyber threats. This focus has come alongside amplified regulatory attention, much of which pushes for stronger...

View Article

4 key trends reshaping the SIEM market

Security information and event management (SIEM) platforms have evolved far beyond their basic log collection and correlation roots. With cyber threats moving too fast for manual intervention, leading...

View Article


Fortifying cyber security: What does secure look like in 2025?

The evolving cybersecurity landscape has increased security pressures for IT leaders. With the World Economic Forum estimating, the global cost of cybercrime is projected to reach $10.5trillion...

View Article

Why cyber hygiene remains critical in the era of AI-driven threats

Cyber-attacks are an assumed inevitable for businesses today. As companies increasingly handle large amounts of valuable data, safeguarding operations has never been more important. Now, half (50%) of...

View Article

Cyberangriffe: Fertigungsbranche noch immer schlecht vorbereitet

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2466894891.jpg?quality=50&strip=all 5568w,...

View Article
Browsing all 1593 articles
Browse latest View live