Ransomware goes postal: US healthcare firms receive fake extortion letters
In late February, healthcare organizations across the US started receiving extortion demands by mail claiming that their organization’s data had been stolen in a ransomware attack and giving them 10...
View ArticlePositiv denken für Sicherheitsentscheider: 6 Mindsets, die Sie sofort ablegen...
In einem falschen Security-Mindset gefangen? Foto: Paul Craft – shutterstock.comDass Jobs im Bereich Cybersecurity ein hohes Burnout-Potenzial aufweisen, ist längst kein Geheimnis mehr: Das Umfeld von...
View ArticleThe risks of standing down: Why halting US cyber ops against Russia erodes...
The recent order directing US Cyber Command to halt all planning of offensive cyber operations against Russia is more than a tactical shift — it is an outright retreat from deterrence at a time when...
View Article60% of cybersecurity pros looking to change employers
Cybersecurity worker job satisfaction is mediocre with many staff actively considering a change. Only a third or respondents to an annual Cybersecurity Staff Compensation Benchmark Report by IANS...
View ArticleAccess Management Systems sind offene Türen für Hacker
Wenn Hacker biometrische Zugangsdaten erbeuten, können Sie erhebliche Schäden anrichten. shuttertsock – itj aks zoone Fehler in der Konfiguration von Access Management Systems (AMS) gefährden weltweit...
View ArticleBadbox Android botnet disrupted through coordinated threat hunting
Badbox, the notorious Android malware botnet, has been disrupted for a third time in 15 months, with over half a million infected machines now sinkholed. A co-ordinated effort led by the bot detection...
View ArticleUS charges 12 Chinese hackers in major government-backed espionage campaign
US authorities have announced criminal charges against 12 Chinese nationals allegedly involved in a long-running cyber-espionage campaign tied to China’s government. The Justice Department (DOJ) and...
View ArticleHackerangriff auf Stadtwerke Schwerte
Aufgrund einer Cyberattacke auf die Stadtwerke Schwerte sind aktuell einige Dienste der Stadtverwaltung nicht verfügbar. Panya_photo – Shutterstock.com Nach eigenen Angaben wurde das Netzwerk der...
View ArticleChinese APT Silk Typhoon exploits IT supply chain weaknesses for initial access
A China-aligned threat group tracked by Microsoft as Silk Typhoon, two members of which were recently charged by US authorities, has recently shifted its focus to the enterprise IT supply chain by...
View Article11 ruinöse Ransomware-Bedrohungen
Für Unternehmen ist Ransomware weiterhin eine existenzielle Bedrohung, für Kriminelle ein immer einträglicheres (Service)geschäft.Gonin | shutterstock.com Ransomware bleibt branchenübergreifend auf...
View ArticleWhat is risk management? Quantifying and mitigating uncertainty
What is risk management? Risk management is the process of identifying, analyzing, and mitigating uncertainties and threats that can harm your company or organization. No business venture or...
View ArticleBSI veröffentlicht neue Sicherheitsanforderungen für Datenbanksysteme
Die neuen BSI-Anforderungen gelten sowohl für relationale als auch NoSQL-Datenbanksysteme und berücksichtigen alle Betriebsarten. shutterstock – nitpicker Das Bundesamt für Sicherheit in der...
View Article8 obstacles women still face when seeking a leadership role in IT
If you are a tech leader, you might encourage your daughter to follow your path, imagining a journey, like yours, with challenges that can be overcome with hard work. But if you are a man — especially...
View ArticleMangelhafte Cybersicherheit im Gesundheitswesen
15 Prozent der Endgeräte im Gesundheitssektor haben keine oder nicht-übereinstimmende Sicherheits- und Risikokontrollen. Panya_photo – Shutterstock.com Laut dem aktuellen Horizon Report 2025 wurden im...
View ArticleLinux, macOS users infected with malware posing as legitimate Go packages
In a new typosquatting campaign, threat actors are seen using malicious Go packages posing as popular libraries to install malware on unsuspecting Linux and macOS systems. Researchers from the...
View ArticleSuite 404: Training executives for cyberattack response in a playful way
Cyberattacks are all too common in business today. If your own company is affected, quick but prudent action is required — and the C-suite suddenly must make decisions in areas they may otherwise be...
View ArticleCISOs and CIOs forge vital partnerships for business success
Last July, a routine update from cybersecurity software firm CrowdStrike sparked a global IT outage that brought companies to their knees, disrupting operations and amounting to an estimated $5...
View ArticleWas toxische CISOs anrichten
Lipik Stock Media – shutterstock.com Für Keith, einen erfahrenen Cybersecurity-Profi aus New York City in seinen 40ern, gab es mehr als einen Grund, seinen Job hinzuwerfen – und vor allem seinen CISO...
View ArticleRansomware-Attacke auf Willms Fleisch
Der Lebensmittelproduzent Willms Fleisch wurde vermutlich von Hackern angegriffen.Nataliia Maksymenko – Shutterstock Willms zählt zu den größten Fleischproduzenten in Deutschland. Die...
View ArticleBackdoor in Bluetooth-Chip entdeckt
Der Chip ESP32 kommt in zahlreichen Geräten zum Einsatz. Security-Forscher haben nun eine Sicherheitslücke gefunden.Hendrik Sejati – Shutterstock.com Der von der chinesischen Firma Espressif...
View Article