How to fill the cyber talent gap? Get real
Even as colleges and trade schools churn out more and more grads in the field, hundreds of thousands of cybersecurity positions are going unfilled, with many companies suffering understaffing while...
View ArticleDer Kaufratgeber für Breach & Attack Simulation Tools
Breach & Attack Simulation Tools geben Aufschluss darüber, wie gut (oder schlecht) Ihre Sicherheitskontrollen funktionieren.Roman Samborskyi | shutterstock.com Lösungen im Bereich Breach &...
View ArticleHow to configure OAuth in Microsoft 365 Defender and keep your cloud secure
Cloud authentication provides so many advantages in business. It can allow your users to seamlessly authenticate between applications, it’s cost-efficient, and it’s scalable, and it offers great...
View Article5 things to know about ransomware threats in 2025
Ransomware attacks continue to be one of the most significant cybersecurity threats organizations and cybersecurity leaders face. Attacks lead to wide-scale disruptions, large data breaches, huge...
View ArticleOrange Group von Datenleck betroffen
Die Orange Group wurde von einer Ransomware-Attacke getroffen.JeanLucIchard – Shutterstock.com Ein Mitglied der Ransomware-Bande HellCat behauptet, rund 6,5 Gigabyte an Daten von der Orange Group...
View ArticleCritical Microsoft Partner Center vulnerability under attack, CISA warns
A critical vulnerability in Microsoft’s Partner Center platform is under attack, enabling unauthenticated attackers to escalate privileges, potentially leading to data breaches, malware deployment,...
View ArticleSicherheitsrisiko: Microsoft entfernt VSCode-Erweiterungen
Forscher haben herausgefunden, dass zwei VSCode-Erweiterungen mit Schadcode infiziert sind.VZ_Art – Shutterstock.com Die IT-Forscher Amit Assaraf und Itay Kruk entdeckten kürzlich, dass die beiden...
View ArticleSchwachstellen managen: Die besten Vulnerability-Management-Tools
Schwachstellen zu managen, muss keine Schwerstarbeit sein. Wenn Sie die richtigen Tools einsetzen. Das sind die besten in Sachen Vulnerability Management. Foto: eamesBot – shutterstock.comNicht nur...
View ArticleThe CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have...
View ArticleDiese Unternehmen hat’s schon erwischt
Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind.Roman Samborskyi | shutterstock.com Sie denken, Ihre Sicherheitsmaßnahmen können Sie langfristig vor...
View ArticleWhat is zero trust? The security model for a distributed and risky era
What is zero trust? Zero trustis a cybersecurity model or strategy in which no person or computing entity is considered inherently trustworthy, regardless of whether they are inside or outside the...
View ArticleSecurity und GenAI – Zwischen Innovation und Sicherheit
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2396701649_b9c9bf.jpg?quality=50&strip=all 5803w,...
View ArticleInterna von Ransomware-Gruppe Black Basta durchgesickert
Über die vergangenen Jahre hat Black Basta mit mehr als 500 Opfern weltweit von sich Reden gemacht. Durchgesickerte Chat-Protokolle enthüllen die innere Funktionsweise und interne Konflikte der...
View ArticleHacker verschlüsseln Daten von rund 12.000 Patienten
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/02/shutterstock_2321046757_71010c.jpg?quality=50&strip=all 16634w,...
View ArticleIs your enterprise ‘cyber resilient’? Probably not. Here’s how other boards...
In the escalating battle against cyberthreats, most businesses pour more security resources into prevention and detection: Keep attackers at bay, and if (er, when) a breach occurs, respond to it...
View ArticleMicrosoft files lawsuit against LLMjacking gang that bypassed AI safeguards
Microsoft has filed a civil lawsuit against an international gang of cybercriminals that exploited stolen credentials to access generative AI services, including its own. The gang, tracked as...
View ArticleDie besten XDR-Tools
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/02/original2cso_ArtemisDiana.jpg?quality=50&strip=all 6500w,...
View ArticleWhy cyber attackers are targeting your solar energy systems — and how to stop...
High energy costs and concerns over the stability and capacity of electric grids are leading businesses to evaluate and implement their own onsite energy generation systems. These onsite systems,...
View ArticleRansomware access playbook: What Black Basta’s leaked logs reveal
Black Basta, one of the most successful ransomware groups over the past several years, had a major leak of its internal communications recently. The logs provide a glimpse into the playbook of a...
View ArticleForscher entdecken LLM-Sicherheitsrisiko
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2450854311.jpg?quality=50&strip=all 6000w,...
View Article