How CISOs are approaching staffing diversity with DEI initiatives under pressure
For many years, organizations have focused a lot on diversity, equity, and inclusion (DEI) programs and policies, seeing those efforts as the right thing to do as well as a smart business strategy....
View ArticleDOGE’s cost-cutting database dives offer cybersecurity pros vital lessons in...
Cybersecurity has been politically agnostic until recently, but with the many rapid changes introduced by the Trump administration, it has become somewhat politicized and fraught with questions and...
View ArticleHacker nutzen alte Windows-Sicherheitslücke aus – Microsoft tut nichts
Timepopo – shutterstock.com Experten des Sicherheits-Unternehmens Trend Micro haben eine als ZDI-CAN-25373 bezeichnete Sicherheitslücke in Windows entdeckt, die Angreifer seit mindestens 2017...
View ArticleUK cyber agency suggests 2035 deadline to move to quantum-safe encryption,...
The UK’s National Cyber Security Centre (NCSC) has warned that future quantum computers could break today’s encryption, urging businesses and government agencies to start preparing for a post-quantum...
View Article„Ich bin kein Roboter“ – aber ein mögliches Cyber-Opfer
Experten haben mehrere Kampagnen entdeckt, bei denen Angreifer unter anderem steigende „Klick-Toleranz“ mit mehrstufigen Infektionsketten ausnutzen. shutterstock – VectorHot Cyber-Kriminelle werden...
View ArticleNew Windows zero-day feared abused in widespread espionage for years
A zero-day vulnerability stemming from how Windows User Interface handles its shortcut (.lnk) files has been exploited by at least 11 nation-state actors in widespread threat campaigns. According to...
View ArticleRansomware-Attacke auf Mönchengladbacher Altenheimbetreiber
width="2461" height="1384" sizes="(max-width: 2461px) 100vw, 2461px">Eine Ransomware-Bande erpresst den Altenheimbetreiber der Stadt Mönchengladbach mit verschlüsselten Daten. Das Unternehmen...
View ArticlePublic-private partnerships: A catalyst for industry growth and maturity
As cybercriminals evolve their tactics, relying on tools like AI to simplify and speed their existing efforts, the cybersecurity industry also must evolve at an extraordinary pace. From CISOs to...
View ArticleSignal threatens to leave France if encryption backdoor required
Signal is standing its ground to protect its app’s security, threatening on Wednesday to leave France if encryption backdoor requirements are enacted, just as it said it would do in Sweden. “Those...
View ArticleCritical remote code execution flaw patched in Veeam backup servers
Data resilience solutions provider Veeam Software released a critical patch for its Veeam Backup & Replication product. The update fixes a deserialization issue that can result in remote code...
View ArticleDevelopers: apply these 10 mitigations first to prevent supply chain attacks
DevOps leaders hoping to find a single cybersecurity risk framework that will prevent their work from experiencing the kinds of compromises that lead to supply chain attacks will have a hard time,...
View ArticleTeams, Slack & Co. absichern: So wird das Collaboration-Tool kein...
Collaboration Tools wie Microsoft Teams und Slack erleichtern die Zusammenarbeit mit internen und externen Partnern enorm, bergen jedoch auch Risiken. Foto: Ascannio – shutterstock.comSchnelle und...
View Article11 hottest IT security certs for higher pay today
With change a constant, IT professionals looking to improve their careers can benefit from the latest insights into employers’ needs. Data from Foote Partners on the skills and certification most in...
View ArticleCISA marks NAKIVO’s critical backup vulnerability as actively exploited
The Cybersecurity and Infrastructure Security Agency (CISA) has added a patched, high-severity vulnerability affecting NAKIVO’s backup and replication software to its known exploited vulnerability...
View ArticleFür Cyberattacken gewappnet – Krisenkommunikation nach Plan
width="2472" height="1391" sizes="(max-width: 2472px) 100vw, 2472px">Lesen Sie, welche Aspekte für einen Krisenkommunikationsplan entscheidend sind.Gorodenkoff – shutterstock.com Cyberangriffe...
View ArticleAttackers probing backdoor flaw in popular Cisco Smart Licensing Utility,...
Organizations running Cisco’s Smart Licensing Utility (CSLU) should update their software as soon as possible to fix two serious vulnerabilities, the SANS Technology Institute has urged. The CSLU is a...
View ArticleKubernetes Security: Wie Sie Ihre Cluster (besser) absichern
Anatoliy Eremin | shutterstock.com Kubernetes hat sich unter Enterprise-Softwareentwicklern zu einem durchschlagenden Erfolg entwickelt. Das veranlasst kriminelle Hacker zunehmend dazu, entsprechende...
View ArticleCISOs are taking on ever more responsibilities and functional roles – has it...
When George Gerchow was CISO at Sumo Logic, his responsibilities incorporated the kind of work typically assigned to a chief information security officer — no surprise there. But Gerchow was also vice...
View ArticleTrump shifts cyberattack readiness to state and local governments in wake of...
On March 19, the White House issued the first executive order (EO) to directly address cybersecurity policies under Trump’s second term. The order, “Achieving Efficiency Through State and Local...
View ArticleNew phishing campaign uses scareware to steal Apple credentials
A new phishing campaign targeting Mac systems employs scareware tactics to steal Apple IDs and passwords from unsuspecting users. Identified by LayerX Labs, the attack involves compromised websites...
View Article