Quantcast
Channel: Ransomware-Attacke auf Europcar | CSO Online
Browsing all 1606 articles
Browse latest View live

Almost 1 million business and home PCs compromised after users visited...

Careless online surfing by employees continues to be the bane of CISOs trying to keep malware off their IT networks. The latest example of its consequences comes from Microsoft, which reports that in...

View Article


Image may be NSFW.
Clik here to view.

CISOs müssen OT-Risiken stärker adressieren

Da Angriffe auf OT-Bereiche zunehmen, sollten CISOs einen Exposure-Management-Ansatz verfolgen.Summit Art Creations – Shutterstock.com Die Bedrohungen gegen die Betriebstechnik (Operational...

View Article


Security operations centers are fundamental to cybersecurity — here’s how to...

Incident detection and response are fundamental responsibilities for all cybersecurity defenders. In most mid-sized and large organizations — and even some smaller ones, depending on their risk...

View Article

Companies are drowning in high-risk software security debt — and the breach...

Organizations are taking longer to fix security flaws in their software, and the security debt involved is becoming increasingly critical as a result. According to application security vendor...

View Article

Image may be NSFW.
Clik here to view.

Elon Musk spricht von großer Cyberattacke gegen X

Elon Musk sagte im TV-Sender Fox Business Network, man sei noch nicht sicher, was genau passiert sei.Frederic Legrand – COMEO – shutterstock.com Die Online-Plattform X des Tech-Milliardärs Elon Musk...

View Article


Musk links cyberattack on X to Ukraine without evidence

Elon Musk owned X experienced a flurry of outages on Monday, even as the Dark Storm hacking group claimed DDoS attacks on the text-heavy social media giant. The pro-palestinian hacktivist group...

View Article

Image may be NSFW.
Clik here to view.

Diese Unternehmen hat es schon erwischt

Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind.Roman Samborskyi | shutterstock.com Sie denken, Ihre Sicherheitsmaßnahmen können Sie langfristig vor...

View Article

Google paid nearly $12 million to bug hunters last year

Google announced it has paid out $11.8 million to more than 600 security researchers who reported bugs in 2024. Last year, Google increased the rewards in its Vulnerability Reward Program (VPR) to a...

View Article


Ivanti EPM vulnerabilities actively exploited in the wild, CISA warns

The US Cybersecurity and Infrastructure Security agency has added three vulnerabilities in Ivanti Endpoint Manager (EPM) to its known exploited vulnerabilities (KEV) catalog signaling they’ve seen...

View Article


March Patch Tuesday warnings: Act fast to plug zero day holes in Windows, VMware

CISOs need to lean on their admins to plug zero day vulnerabilities in Windows and VMware products as soon as possible, before they are widely exploited. In addition, Windows admins need to be aware...

View Article

Microsoft patches privilege escalation flaw exploited since 2023

Microsoft has released fixes for 57 vulnerabilities in this month’s patch cycle, including for six flaws that have signs of in-the-wild exploitation or disclosure. One of the zero-day exploits has...

View Article

Image may be NSFW.
Clik here to view.

Was CISOs von Moschusochsen lernen können

Von Moschusochsen können sich CISOs eine Scheibe abschneiden – wenn es nach unserem Autor geht.Wirestock Creators – shutterstock.com Drittanbieter-Risikomanagement ist für CISOs und...

View Article

The cybersecurity product sales process is broken, but it doesn’t have to be

If you’re a CISO, chances are your inbox is filled with pitches from vendors claiming to have developed the latest game-changer in cybersecurity. And if you’re a vendor, you know the challenges of...

View Article


The state of ransomware: Fragmented but still potent despite takedowns

Increased law enforcement actions, improved international collaboration, and a growing refusal by victims to pay extortion demands has led a drop in ransomware payments by around a third. Total volume...

View Article

Apple patches zero-day bugs used in targeted iPhone attacks

Apple has rolled out emergency patches for a bug affecting Webkit, the open-source web browser engine used primarily in Safari, against active exploitations in the wild. The vulnerability,...

View Article


CISA cybersecurity workforce faces cuts amid shifting US strategy

The US government’s cybersecurity defenses are under strain after the White House-backed Department of Government Efficiency (DOGE) abruptly terminated key contracts, leading to the dismantling of two...

View Article

Unternehmen ertrinken in Software-Schwachstellen

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2555209523.jpg?quality=50&strip=all 12500w,...

View Article


Fortinet reinforces OT network security platform

Fortinet has bolstered its OT Security Platform to help customers more effectively protect industrial control systems and other operational technology networks from cyberattacks. Fortinet’s OT...

View Article

Image may be NSFW.
Clik here to view.

Neun Prozent der Betriebe wurden ausgespäht

Im Fokus der Spione stehen innovative, forschende Unternehmen, die im internationalen Wettbewerb stehen. AlyoshinE – Shutterstock.com Neun Prozent der Betriebe in Deutschland sind einer Befragung...

View Article

Chinese cyberespionage group deploys custom backdoors on Juniper routers

A Chinese cyberespionage group with a history of exploiting proprietary network-edge devices and developing custom malware for them has also been targeting enterprise and ISP-grade Juniper MX Series...

View Article
Browsing all 1606 articles
Browse latest View live