Quantcast
Browsing all 1614 articles
Browse latest View live

SAP patches severe vulnerabilities in NetWeaver and Commerce apps

SAP has patched high-severity vulnerabilities in its Commerce and NetWeaver enterprise software packages. The updates came as part of 25 security patches released on Tuesday for the latest edition of...

View Article


Trump nominates cyber vet Sean Plankey for CISA chief amid DOGE cuts and firings

Donald Trump has nominated Sean Plankey to be director of the Cybersecurity and Infrastructure Security Agency (CISA), replacing Jen Easterly, who left as CISA’s chief on Jan. 20. A graduate of the US...

View Article


Aptori Now on Google Cloud Marketplace for AI-Powered Security and Automated...

Aptori’s AI-Driven AppSec Platform Proactively Eliminates Vulnerabilities to Minimize Risk and Ensure Compliance. Aptori, a leader in AI-driven application security, today announced the launch of its...

View Article

Image may be NSFW.
Clik here to view.

6 wichtige Punkte für Ihren Incident Response Plan

Lesen Sie, welche Schritte für Ihren Notfallplan besonders wichtig sind.PeopleImages.com – Yuri A – Shutterstock.com Wenn ein Unternehmen einen größeren Ausfall seiner IT-Systeme erlebt –...

View Article

Image may be NSFW.
Clik here to view.

Generative AI red teaming: Tips and techniques for putting LLMs to the test

Red teaming is a time-proven approach to testing and bolstering cybersecurity systems, but it has always needed to evolve alongside technology. The explosion of generative AI and large language models...

View Article


Hiring privacy experts is tough — here’s why

The demand for privacy professionals is soaring, but hiring an expert in this field is proving to be a significant challenge. According to ISACA’s State of Privacy 2025 survey, 73% of organizations...

View Article

GitHub to unbundle Advanced Security

GitHub announced plans to unbundle its GitHub Advanced Security (GHAS) product, breaking it up into two standalone products: GitHub Secret Protection and GitHub Code Security. The unbundling is set to...

View Article

Australian financial firm hit with lawsuit after massive data breach

Australian financial services firm FIIG Securities faces legal action from the Australian Securities and Investments Commission (ASIC) following a cybersecurity breach that exposed sensitive...

View Article


Image may be NSFW.
Clik here to view.

KI-gestützte Angriffe machen deutschen Betrieben zu schaffen

Während Hacker KI bereits flächendeckend für ihre Angriffe missbrauchen, tun sich die Verteidiger noch schwer mit dem KI-Einsatz.DC Studio / Shutterstock Viele deutsche Unternehmen identifizieren...

View Article


CIOs and CISOs take on NIS2: Key challenges, security opportunities

The impact of NIS2 compliance on day-to-day operations has put many IT leaders in a stressful bind. The Network and Information Security 2 directive, which expands the scope of its predecessor to...

View Article

The most notorious and damaging ransomware of all time

Ransomware has a long history, dating back to the late 1980s. This past year, it generated $811 millions in payments to the criminal groups behind it. Victims incur recovery costs even if they pay the...

View Article

Image may be NSFW.
Clik here to view.

Fast 1 Million Geschäfts- und Privat-PCs kompromittiert

Ein Bericht von Microsoft zeigt, wie wichtig es für CISOs ist, das Sicherheitsbewusstsein ihrer Mitarbeiter zu schulen.shutterstock – Hernan E. Schmidt Malware ist und bleibt ein massives Problem,...

View Article

Cybersecurity in Kommunen: Eigeninitiative gefragt

width="2480" height="1395" sizes="(max-width: 2480px) 100vw, 2480px">Deutsche Kommunen erscheinen in Sachen Cybersicherheit eine leichte Beute zu sein.motioncenter – shutterstock.com Das...

View Article


Image may be NSFW.
Clik here to view.

Europäische Unternehmen haben keinen (Krisen)-Plan

Eine aktuelle Studie zeigt Defizite im Risikomanagement von Unternehmen auf beiden Seiten des Atlantiks.rawf8 – shutterstock.com Internationale und nationale, politische und unternehmerische Krisen...

View Article

Report on ransomware attacks on Fortinet firewalls also reveals possible...

A new ransomware gang is quickly exploiting two authentication bypass vulnerabilities in Fortinet firewalls, researchers say. The researchers at Forescout outlined recent attacks by the gang in a...

View Article


Governments won’t like this: encrypted messaging between Android and iOS...

Imagine a world of the near future where Android and Apple iOS users can message one another with the certainty that their communication is secured against eavesdropping by end-to-end encryption...

View Article

Image may be NSFW.
Clik here to view.

8 Tipps zum Schutz vor Business E-Mail Compromise

Lesen Sie, welche Punkte in einer Richtlinie zum Schutz vor Business E-Mail Compromise (BEC) enthalten sein sollten. Foto: MMD Creative – shutterstock.comLaut einer Analyse von Eye Security waren...

View Article


Image may be NSFW.
Clik here to view.

7 misconceptions about the CISO role

There are many misconceptions about the CISO role, which may be due in part to it being a relatively new position at many organizations with most security leaders coming up through the ranks of the...

View Article

AI development pipeline attacks expand CISOs’ software supply chain risk

Widespread flaws in open-source and third-party commercial software along with malicious campaigns targeting AI development pipelines are exacerbating software supply chain security problems....

View Article

GitHub accounts targeted with fake security alerts

In a new phishing campaign, GitHub developers are being targeted with fake “Security Alerts” where they are prompted to authorize a malicious OAuth application. Successful execution of the Click-fix...

View Article
Browsing all 1614 articles
Browse latest View live