SAP patches severe vulnerabilities in NetWeaver and Commerce apps
SAP has patched high-severity vulnerabilities in its Commerce and NetWeaver enterprise software packages. The updates came as part of 25 security patches released on Tuesday for the latest edition of...
View ArticleTrump nominates cyber vet Sean Plankey for CISA chief amid DOGE cuts and firings
Donald Trump has nominated Sean Plankey to be director of the Cybersecurity and Infrastructure Security Agency (CISA), replacing Jen Easterly, who left as CISA’s chief on Jan. 20. A graduate of the US...
View ArticleAptori Now on Google Cloud Marketplace for AI-Powered Security and Automated...
Aptori’s AI-Driven AppSec Platform Proactively Eliminates Vulnerabilities to Minimize Risk and Ensure Compliance. Aptori, a leader in AI-driven application security, today announced the launch of its...
View Article6 wichtige Punkte für Ihren Incident Response Plan
Lesen Sie, welche Schritte für Ihren Notfallplan besonders wichtig sind.PeopleImages.com – Yuri A – Shutterstock.com Wenn ein Unternehmen einen größeren Ausfall seiner IT-Systeme erlebt –...
View ArticleGenerative AI red teaming: Tips and techniques for putting LLMs to the test
Red teaming is a time-proven approach to testing and bolstering cybersecurity systems, but it has always needed to evolve alongside technology. The explosion of generative AI and large language models...
View ArticleHiring privacy experts is tough — here’s why
The demand for privacy professionals is soaring, but hiring an expert in this field is proving to be a significant challenge. According to ISACA’s State of Privacy 2025 survey, 73% of organizations...
View ArticleGitHub to unbundle Advanced Security
GitHub announced plans to unbundle its GitHub Advanced Security (GHAS) product, breaking it up into two standalone products: GitHub Secret Protection and GitHub Code Security. The unbundling is set to...
View ArticleAustralian financial firm hit with lawsuit after massive data breach
Australian financial services firm FIIG Securities faces legal action from the Australian Securities and Investments Commission (ASIC) following a cybersecurity breach that exposed sensitive...
View ArticleKI-gestützte Angriffe machen deutschen Betrieben zu schaffen
Während Hacker KI bereits flächendeckend für ihre Angriffe missbrauchen, tun sich die Verteidiger noch schwer mit dem KI-Einsatz.DC Studio / Shutterstock Viele deutsche Unternehmen identifizieren...
View ArticleCIOs and CISOs take on NIS2: Key challenges, security opportunities
The impact of NIS2 compliance on day-to-day operations has put many IT leaders in a stressful bind. The Network and Information Security 2 directive, which expands the scope of its predecessor to...
View ArticleThe most notorious and damaging ransomware of all time
Ransomware has a long history, dating back to the late 1980s. This past year, it generated $811 millions in payments to the criminal groups behind it. Victims incur recovery costs even if they pay the...
View ArticleFast 1 Million Geschäfts- und Privat-PCs kompromittiert
Ein Bericht von Microsoft zeigt, wie wichtig es für CISOs ist, das Sicherheitsbewusstsein ihrer Mitarbeiter zu schulen.shutterstock – Hernan E. Schmidt Malware ist und bleibt ein massives Problem,...
View ArticleCybersecurity in Kommunen: Eigeninitiative gefragt
width="2480" height="1395" sizes="(max-width: 2480px) 100vw, 2480px">Deutsche Kommunen erscheinen in Sachen Cybersicherheit eine leichte Beute zu sein.motioncenter – shutterstock.com Das...
View ArticleEuropäische Unternehmen haben keinen (Krisen)-Plan
Eine aktuelle Studie zeigt Defizite im Risikomanagement von Unternehmen auf beiden Seiten des Atlantiks.rawf8 – shutterstock.com Internationale und nationale, politische und unternehmerische Krisen...
View ArticleReport on ransomware attacks on Fortinet firewalls also reveals possible...
A new ransomware gang is quickly exploiting two authentication bypass vulnerabilities in Fortinet firewalls, researchers say. The researchers at Forescout outlined recent attacks by the gang in a...
View ArticleGovernments won’t like this: encrypted messaging between Android and iOS...
Imagine a world of the near future where Android and Apple iOS users can message one another with the certainty that their communication is secured against eavesdropping by end-to-end encryption...
View Article8 Tipps zum Schutz vor Business E-Mail Compromise
Lesen Sie, welche Punkte in einer Richtlinie zum Schutz vor Business E-Mail Compromise (BEC) enthalten sein sollten. Foto: MMD Creative – shutterstock.comLaut einer Analyse von Eye Security waren...
View Article7 misconceptions about the CISO role
There are many misconceptions about the CISO role, which may be due in part to it being a relatively new position at many organizations with most security leaders coming up through the ranks of the...
View ArticleAI development pipeline attacks expand CISOs’ software supply chain risk
Widespread flaws in open-source and third-party commercial software along with malicious campaigns targeting AI development pipelines are exacerbating software supply chain security problems....
View ArticleGitHub accounts targeted with fake security alerts
In a new phishing campaign, GitHub developers are being targeted with fake “Security Alerts” where they are prompted to authorize a malicious OAuth application. Successful execution of the Click-fix...
View Article