Almost 1 million business and home PCs compromised after users visited...
Careless online surfing by employees continues to be the bane of CISOs trying to keep malware off their IT networks. The latest example of its consequences comes from Microsoft, which reports that in...
View ArticleCISOs müssen OT-Risiken stärker adressieren
Da Angriffe auf OT-Bereiche zunehmen, sollten CISOs einen Exposure-Management-Ansatz verfolgen.Summit Art Creations – Shutterstock.com Die Bedrohungen gegen die Betriebstechnik (Operational...
View ArticleSecurity operations centers are fundamental to cybersecurity — here’s how to...
Incident detection and response are fundamental responsibilities for all cybersecurity defenders. In most mid-sized and large organizations — and even some smaller ones, depending on their risk...
View ArticleCompanies are drowning in high-risk software security debt — and the breach...
Organizations are taking longer to fix security flaws in their software, and the security debt involved is becoming increasingly critical as a result. According to application security vendor...
View ArticleElon Musk spricht von großer Cyberattacke gegen X
Elon Musk sagte im TV-Sender Fox Business Network, man sei noch nicht sicher, was genau passiert sei.Frederic Legrand – COMEO – shutterstock.com Die Online-Plattform X des Tech-Milliardärs Elon Musk...
View ArticleMusk links cyberattack on X to Ukraine without evidence
Elon Musk owned X experienced a flurry of outages on Monday, even as the Dark Storm hacking group claimed DDoS attacks on the text-heavy social media giant. The pro-palestinian hacktivist group...
View ArticleDiese Unternehmen hat es schon erwischt
Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind.Roman Samborskyi | shutterstock.com Sie denken, Ihre Sicherheitsmaßnahmen können Sie langfristig vor...
View ArticleGoogle paid nearly $12 million to bug hunters last year
Google announced it has paid out $11.8 million to more than 600 security researchers who reported bugs in 2024. Last year, Google increased the rewards in its Vulnerability Reward Program (VPR) to a...
View ArticleIvanti EPM vulnerabilities actively exploited in the wild, CISA warns
The US Cybersecurity and Infrastructure Security agency has added three vulnerabilities in Ivanti Endpoint Manager (EPM) to its known exploited vulnerabilities (KEV) catalog signaling they’ve seen...
View ArticleMarch Patch Tuesday warnings: Act fast to plug zero day holes in Windows, VMware
CISOs need to lean on their admins to plug zero day vulnerabilities in Windows and VMware products as soon as possible, before they are widely exploited. In addition, Windows admins need to be aware...
View ArticleMicrosoft patches privilege escalation flaw exploited since 2023
Microsoft has released fixes for 57 vulnerabilities in this month’s patch cycle, including for six flaws that have signs of in-the-wild exploitation or disclosure. One of the zero-day exploits has...
View ArticleWas CISOs von Moschusochsen lernen können
Von Moschusochsen können sich CISOs eine Scheibe abschneiden – wenn es nach unserem Autor geht.Wirestock Creators – shutterstock.com Drittanbieter-Risikomanagement ist für CISOs und...
View ArticleThe cybersecurity product sales process is broken, but it doesn’t have to be
If you’re a CISO, chances are your inbox is filled with pitches from vendors claiming to have developed the latest game-changer in cybersecurity. And if you’re a vendor, you know the challenges of...
View ArticleThe state of ransomware: Fragmented but still potent despite takedowns
Increased law enforcement actions, improved international collaboration, and a growing refusal by victims to pay extortion demands has led a drop in ransomware payments by around a third. Total volume...
View ArticleApple patches zero-day bugs used in targeted iPhone attacks
Apple has rolled out emergency patches for a bug affecting Webkit, the open-source web browser engine used primarily in Safari, against active exploitations in the wild. The vulnerability,...
View ArticleCISA cybersecurity workforce faces cuts amid shifting US strategy
The US government’s cybersecurity defenses are under strain after the White House-backed Department of Government Efficiency (DOGE) abruptly terminated key contracts, leading to the dismantling of two...
View ArticleUnternehmen ertrinken in Software-Schwachstellen
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2555209523.jpg?quality=50&strip=all 12500w,...
View ArticleFortinet reinforces OT network security platform
Fortinet has bolstered its OT Security Platform to help customers more effectively protect industrial control systems and other operational technology networks from cyberattacks. Fortinet’s OT...
View ArticleNeun Prozent der Betriebe wurden ausgespäht
Im Fokus der Spione stehen innovative, forschende Unternehmen, die im internationalen Wettbewerb stehen. AlyoshinE – Shutterstock.com Neun Prozent der Betriebe in Deutschland sind einer Befragung...
View ArticleChinese cyberespionage group deploys custom backdoors on Juniper routers
A Chinese cyberespionage group with a history of exploiting proprietary network-edge devices and developing custom malware for them has also been targeting enterprise and ISP-grade Juniper MX Series...
View Article