Quantcast
Browsing all 1606 articles
Browse latest View live

Ransomware goes postal: US healthcare firms receive fake extortion letters

In late February, healthcare organizations across the US started receiving extortion demands by mail claiming that their organization’s data had been stolen in a ransomware attack and giving them 10...

View Article


Image may be NSFW.
Clik here to view.

Positiv denken für Sicherheitsentscheider: 6 Mindsets, die Sie sofort ablegen...

In einem falschen Security-Mindset gefangen? Foto: Paul Craft – shutterstock.comDass Jobs im Bereich Cybersecurity ein hohes Burnout-Potenzial aufweisen, ist längst kein Geheimnis mehr: Das Umfeld von...

View Article


The risks of standing down: Why halting US cyber ops against Russia erodes...

The recent order directing US Cyber Command to halt all planning of offensive cyber operations against Russia is more than a tactical shift — it is an outright retreat from deterrence at a time when...

View Article

60% of cybersecurity pros looking to change employers

Cybersecurity worker job satisfaction is mediocre with many staff actively considering a change. Only a third or respondents to an annual Cybersecurity Staff Compensation Benchmark Report by IANS...

View Article

Image may be NSFW.
Clik here to view.

Access Management Systems sind offene Türen für Hacker

Wenn Hacker biometrische Zugangsdaten erbeuten, können Sie erhebliche Schäden anrichten. shuttertsock – itj aks zoone Fehler in der Konfiguration von Access Management Systems (AMS) gefährden weltweit...

View Article


Badbox Android botnet disrupted through coordinated threat hunting

Badbox, the notorious Android malware botnet, has been disrupted for a third time in 15 months, with over half a million infected machines now sinkholed. A co-ordinated effort led by the bot detection...

View Article

US charges 12 Chinese hackers in major government-backed espionage campaign

US authorities have announced criminal charges against 12 Chinese nationals allegedly involved in a long-running cyber-espionage campaign tied to China’s government. The Justice Department (DOJ) and...

View Article

Image may be NSFW.
Clik here to view.

Hackerangriff auf Stadtwerke Schwerte

Aufgrund einer Cyberattacke auf die Stadtwerke Schwerte sind aktuell einige Dienste der Stadtverwaltung nicht verfügbar. Panya_photo – Shutterstock.com Nach eigenen Angaben wurde das Netzwerk der...

View Article


Chinese APT Silk Typhoon exploits IT supply chain weaknesses for initial access

A China-aligned threat group tracked by Microsoft as Silk Typhoon, two members of which were recently charged by US authorities, has recently shifted its focus to the enterprise IT supply chain by...

View Article


Image may be NSFW.
Clik here to view.

11 ruinöse Ransomware-Bedrohungen

Für Unternehmen ist Ransomware weiterhin eine existenzielle Bedrohung, für Kriminelle ein immer einträglicheres (Service)geschäft.Gonin | shutterstock.com Ransomware bleibt branchenübergreifend auf...

View Article

What is risk management? Quantifying and mitigating uncertainty

What is risk management? Risk management is the process of identifying, analyzing, and mitigating uncertainties and threats that can harm your company or organization. No business venture or...

View Article

Image may be NSFW.
Clik here to view.

BSI veröffentlicht neue Sicherheitsanforderungen für Datenbanksysteme

Die neuen BSI-Anforderungen gelten sowohl für relationale als auch NoSQL-Datenbanksysteme und berücksichtigen alle Betriebsarten. shutterstock – nitpicker Das Bundesamt für Sicherheit in der...

View Article

8 obstacles women still face when seeking a leadership role in IT

If you are a tech leader, you might encourage your daughter to follow your path, imagining a journey, like yours, with challenges that can be overcome with hard work. But if you are a man — especially...

View Article


Image may be NSFW.
Clik here to view.

Mangelhafte Cybersicherheit im Gesundheitswesen

15 Prozent der Endgeräte im Gesundheitssektor haben keine oder nicht-übereinstimmende Sicherheits- und Risikokontrollen. Panya_photo – Shutterstock.com Laut dem aktuellen Horizon Report 2025 wurden im...

View Article

Linux, macOS users infected with malware posing as legitimate Go packages

In a new typosquatting campaign, threat actors are seen using malicious Go packages posing as popular libraries to install malware on unsuspecting Linux and macOS systems. Researchers from the...

View Article


Image may be NSFW.
Clik here to view.

Suite 404: Training executives for cyberattack response in a playful way

Cyberattacks are all too common in business today. If your own company is affected, quick but prudent action is required — and the C-suite suddenly must make decisions in areas they may otherwise be...

View Article

Image may be NSFW.
Clik here to view.

CISOs and CIOs forge vital partnerships for business success

Last July, a routine update from cybersecurity software firm CrowdStrike sparked a global IT outage that brought companies to their knees, disrupting operations and amounting to an estimated $5...

View Article


Image may be NSFW.
Clik here to view.

Was toxische CISOs anrichten

Lipik Stock Media – shutterstock.com Für Keith, einen erfahrenen Cybersecurity-Profi aus New York City in seinen 40ern, gab es mehr als einen Grund, seinen Job hinzuwerfen – und vor allem seinen CISO...

View Article

Image may be NSFW.
Clik here to view.

Ransomware-Attacke auf Willms Fleisch

Der Lebensmittelproduzent Willms Fleisch wurde vermutlich von Hackern angegriffen.Nataliia Maksymenko – Shutterstock Willms zählt zu den größten Fleischproduzenten in Deutschland. Die...

View Article

Image may be NSFW.
Clik here to view.

Backdoor in Bluetooth-Chip entdeckt

Der Chip ESP32 kommt in zahlreichen Geräten zum Einsatz. Security-Forscher haben nun eine Sicherheitslücke gefunden.Hendrik Sejati – Shutterstock.com Der von der chinesischen Firma Espressif...

View Article
Browsing all 1606 articles
Browse latest View live