Quantcast
Browsing all 1594 articles
Browse latest View live

How CISOs are approaching staffing diversity with DEI initiatives under pressure

For many years, organizations have focused a lot on diversity, equity, and inclusion (DEI) programs and policies, seeing those efforts as the right thing to do as well as a smart business strategy....

View Article


DOGE’s cost-cutting database dives offer cybersecurity pros vital lessons in...

Cybersecurity has been politically agnostic until recently, but with the many rapid changes introduced by the Trump administration, it has become somewhat politicized and fraught with questions and...

View Article


Image may be NSFW.
Clik here to view.

Hacker nutzen alte Windows-Sicherheitslücke aus – Microsoft tut nichts

Timepopo – shutterstock.com Experten des Sicherheits-Unternehmens Trend Micro haben eine als ZDI-CAN-25373 bezeichnete Sicherheitslücke in Windows entdeckt, die Angreifer seit mindestens 2017...

View Article

UK cyber agency suggests 2035 deadline to move to quantum-safe encryption,...

The UK’s National Cyber Security Centre (NCSC) has warned that future quantum computers could break today’s encryption, urging businesses and government agencies to start preparing for a post-quantum...

View Article

Image may be NSFW.
Clik here to view.

„Ich bin kein Roboter“ – aber ein mögliches Cyber-Opfer

Experten haben mehrere Kampagnen entdeckt, bei denen Angreifer unter anderem steigende „Klick-Toleranz“ mit mehrstufigen Infektionsketten ausnutzen. shutterstock – VectorHot Cyber-Kriminelle werden...

View Article


New Windows zero-day feared abused in widespread espionage for years

A zero-day vulnerability stemming from how Windows User Interface handles its shortcut (.lnk) files has been exploited by at least 11 nation-state actors in widespread threat campaigns. According to...

View Article

Ransomware-Attacke auf Mönchengladbacher Altenheimbetreiber

width="2461" height="1384" sizes="(max-width: 2461px) 100vw, 2461px">Eine Ransomware-Bande erpresst den Altenheimbetreiber der Stadt Mönchengladbach mit verschlüsselten Daten. Das Unternehmen...

View Article

Public-private partnerships: A catalyst for industry growth and maturity

As cybercriminals evolve their tactics, relying on tools like AI to simplify and speed their existing efforts, the cybersecurity industry also must evolve at an extraordinary pace. From CISOs to...

View Article


Signal threatens to leave France if encryption backdoor required

Signal is standing its ground to protect its app’s security, threatening on Wednesday to leave France if encryption backdoor requirements are enacted, just as it said it would do in Sweden. “Those...

View Article


Critical remote code execution flaw patched in Veeam backup servers

Data resilience solutions provider Veeam Software released a critical patch for its Veeam Backup & Replication product. The update fixes a deserialization issue that can result in remote code...

View Article

Developers: apply these 10 mitigations first to prevent supply chain attacks

DevOps leaders hoping to find a single cybersecurity risk framework that will prevent their work from experiencing the kinds of compromises that lead to supply chain attacks will have a hard time,...

View Article

Image may be NSFW.
Clik here to view.

Teams, Slack & Co. absichern: So wird das Collaboration-Tool kein...

Collaboration Tools wie Microsoft Teams und Slack erleichtern die Zusammenarbeit mit internen und externen Partnern enorm, bergen jedoch auch Risiken. Foto: Ascannio – shutterstock.comSchnelle und...

View Article

11 hottest IT security certs for higher pay today

With change a constant, IT professionals looking to improve their careers can benefit from the latest insights into employers’ needs. Data from Foote Partners on the skills and certification most in...

View Article


CISA marks NAKIVO’s critical backup vulnerability as actively exploited

The Cybersecurity and Infrastructure Security Agency (CISA) has added a patched, high-severity vulnerability affecting NAKIVO’s backup and replication software to its known exploited vulnerability...

View Article

Für Cyberattacken gewappnet – Krisenkommunikation nach Plan

width="2472" height="1391" sizes="(max-width: 2472px) 100vw, 2472px">Lesen Sie, welche Aspekte für einen Krisenkommunikationsplan entscheidend sind.Gorodenkoff – shutterstock.com Cyberangriffe...

View Article


Attackers probing backdoor flaw in popular Cisco Smart Licensing Utility,...

Organizations running Cisco’s Smart Licensing Utility (CSLU) should update their software as soon as possible to fix two serious vulnerabilities, the SANS Technology Institute has urged. The CSLU is a...

View Article

Image may be NSFW.
Clik here to view.

Kubernetes Security: Wie Sie Ihre Cluster (besser) absichern

Anatoliy Eremin | shutterstock.com Kubernetes hat sich unter Enterprise-Softwareentwicklern zu einem durchschlagenden Erfolg entwickelt. Das veranlasst kriminelle Hacker zunehmend dazu, entsprechende...

View Article


CISOs are taking on ever more responsibilities and functional roles – has it...

When George Gerchow was CISO at Sumo Logic, his responsibilities incorporated the kind of work typically assigned to a chief information security officer — no surprise there. But Gerchow was also vice...

View Article

Trump shifts cyberattack readiness to state and local governments in wake of...

On March 19, the White House issued the first executive order (EO) to directly address cybersecurity policies under Trump’s second term. The order, “Achieving Efficiency Through State and Local...

View Article

New phishing campaign uses scareware to steal Apple credentials

A new phishing campaign targeting Mac systems employs scareware tactics to steal Apple IDs and passwords from unsuspecting users. Identified by LayerX Labs, the attack involves compromised websites...

View Article
Browsing all 1594 articles
Browse latest View live