Quantcast
Browsing all 1614 articles
Browse latest View live

How to fill the cyber talent gap? Get real

Even as colleges and trade schools churn out more and more grads in the field, hundreds of thousands of cybersecurity positions are going unfilled, with many companies suffering understaffing while...

View Article


Image may be NSFW.
Clik here to view.

Der Kaufratgeber für Breach & Attack Simulation Tools

Breach & Attack Simulation Tools geben Aufschluss darüber, wie gut (oder schlecht) Ihre Sicherheitskontrollen funktionieren.Roman Samborskyi | shutterstock.com Lösungen im Bereich Breach &...

View Article


Image may be NSFW.
Clik here to view.

How to configure OAuth in Microsoft 365 Defender and keep your cloud secure

Cloud authentication provides so many advantages in business. It can allow your users to seamlessly authenticate between applications, it’s cost-efficient, and it’s scalable, and it offers great...

View Article

5 things to know about ransomware threats in 2025

Ransomware attacks continue to be one of the most significant cybersecurity threats organizations and cybersecurity leaders face. Attacks lead to wide-scale disruptions, large data breaches, huge...

View Article

Image may be NSFW.
Clik here to view.

Orange Group von Datenleck betroffen

Die Orange Group wurde von einer Ransomware-Attacke getroffen.JeanLucIchard – Shutterstock.com Ein Mitglied der Ransomware-Bande HellCat behauptet, rund 6,5 Gigabyte an Daten von der Orange Group...

View Article


Critical Microsoft Partner Center vulnerability under attack, CISA warns

A critical vulnerability in Microsoft’s Partner Center platform is under attack, enabling unauthenticated attackers to escalate privileges, potentially leading to data breaches, malware deployment,...

View Article

Image may be NSFW.
Clik here to view.

Sicherheitsrisiko: Microsoft entfernt VSCode-Erweiterungen

Forscher haben herausgefunden, dass zwei VSCode-Erweiterungen mit Schadcode infiziert sind.VZ_Art – Shutterstock.com Die IT-Forscher Amit Assaraf und Itay Kruk entdeckten kürzlich, dass die beiden...

View Article

Image may be NSFW.
Clik here to view.

Schwachstellen managen: Die besten Vulnerability-Management-Tools

Schwachstellen zu managen, muss keine Schwerstarbeit sein. Wenn Sie die richtigen Tools einsetzen. Das sind die besten in Sachen Vulnerability Management. Foto: eamesBot – shutterstock.comNicht nur...

View Article


The CSO guide to top security conferences

There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have...

View Article


Image may be NSFW.
Clik here to view.

Diese Unternehmen hat’s schon erwischt

Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind.Roman Samborskyi | shutterstock.com Sie denken, Ihre Sicherheitsmaßnahmen können Sie langfristig vor...

View Article

What is zero trust? The security model for a distributed and risky era

What is zero trust? Zero trustis a cybersecurity model or strategy in which no person or computing entity is considered inherently trustworthy, regardless of whether they are inside or outside the...

View Article

Image may be NSFW.
Clik here to view.

Security und GenAI – Zwischen Innovation und Sicherheit

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2396701649_b9c9bf.jpg?quality=50&strip=all 5803w,...

View Article

Image may be NSFW.
Clik here to view.

Interna von Ransomware-Gruppe Black Basta durchgesickert

Über die vergangenen Jahre hat Black Basta mit mehr als 500 Opfern weltweit von sich Reden gemacht. Durchgesickerte Chat-Protokolle enthüllen die innere Funktionsweise und interne Konflikte der...

View Article


Hacker verschlüsseln Daten von rund 12.000 Patienten

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2321046757_71010c.jpg?quality=50&strip=all 16634w,...

View Article

Is your enterprise ‘cyber resilient’? Probably not. Here’s how other boards...

In the escalating battle against cyberthreats, most businesses pour more security resources into prevention and detection: Keep attackers at bay, and if (er, when) a breach occurs, respond to it...

View Article


Microsoft files lawsuit against LLMjacking gang that bypassed AI safeguards

Microsoft has filed a civil lawsuit against an international gang of cybercriminals that exploited stolen credentials to access generative AI services, including its own. The gang, tracked as...

View Article

Die besten XDR-Tools

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?quality=50&strip=all 6500w,...

View Article


Why cyber attackers are targeting your solar energy systems — and how to stop...

High energy costs and concerns over the stability and capacity of electric grids are leading businesses to evaluate and implement their own onsite energy generation systems. These onsite systems,...

View Article

Ransomware access playbook: What Black Basta’s leaked logs reveal

Black Basta, one of the most successful ransomware groups over the past several years, had a major leak of its internal communications recently. The logs provide a glimpse into the playbook of a...

View Article

Forscher entdecken LLM-Sicherheitsrisiko

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2450854311.jpg?quality=50&strip=all 6000w,...

View Article
Browsing all 1614 articles
Browse latest View live