Quantcast
Channel: Cyber agencies urge organizations to collaborate to stop fast flux DNS attacks | CSO Online
Browsing all 1594 articles
Browse latest View live

KI als Turbo für Kriminelle

width="2500" height="1406" sizes="(max-width: 2500px) 100vw, 2500px">Europol warnt: Kriminelle nutzen KI, um ihre Operationen zu automatisieren und zu verstärken.Golden Dayz – shutterstock.com Von...

View Article


Oracle Cloud breach may impact 140,000 enterprise customers

A threat actor has reportedly breached Oracle Cloud infrastructure, exfiltrating six million sensitive authentication records and potentially endangering more than 140,000 enterprise customers. The...

View Article


FBI warns: beware of free online document converter tools

Improvements Microsoft has made to Office document security that disable macros and other embedded malware by default has forced criminals to up their innovation game, a security expert said Monday....

View Article

Quantenschlüssel aus der Sicht des CISO

loading="lazy" width="400px">Quantum Key Distribution (QKD) dient dazu, Verschlüsselungsschlüssel sicher zwischen zwei Parteien zu verteilen.Shaiith – shutterstock.com Der sogenannte Q-Day, an...

View Article

11 ways cybercriminals are making phishing more potent than ever

Phishing has long been a primary source for security breaches — a major issue that, despite years of security awareness training, remains a top cybersecurity concern today. But thanks to refinements...

View Article


Microsoft launches AI agents to automate cybersecurity amid rising threats

Microsoft has introduced a new set of AI agents for its Security Copilot platform, designed to automate key cybersecurity functions as organizations face increasingly complex and fast-moving digital...

View Article

New VanHelsing ransomware claims three victims within a month

A new ransomware-as-a-service (RaaS) affiliate program, VanHelsing, is rapidly gaining traction, with its operators successfully targeting three victims within a month of its launch on March 7....

View Article

Neue VanHelsing-Ransomware breitet sich rasant aus

width="3200" height="1800" sizes="(max-width: 3200px) 100vw, 3200px">Das neue Ransomware-Programm VanHelsing zielt auf Windows-, Linux-, BSD-, ARM- und ESXi-Systeme.Andrey_Popov – shutterstock.com...

View Article


Warning for developers, web admins: update Next.js to prevent exploit

Developers and web admins using the Next.js framework for building or managing interactive web applications should install a security update to plug a critical vulnerability. The vulnerability,...

View Article


Critical RCE flaws put Kubernetes clusters at risk of takeover

The Kubernetes project has released patches for five vulnerabilities in a widely used popular component called the Ingress NGINX Controller that’s used to route external traffic to Kubernetes...

View Article

Image may be NSFW.
Clik here to view.

9 Dinge, die CISOs den Job kosten

Sie können nicht sagen, wir hätten Sie nicht gewarnt… Foto: Anton Vierietin | shutterstock.comCISOs und andere Executives im Bereich IT-Sicherheit arbeiten im Regelfall hart daran, ihr Unternehmen –...

View Article

Rising attack exposure, threat sophistication spur interest in detection...

Detection engineering, which was once a niche practice among mostly large companies, appears to have evolved into a capability that organizations across industries now consider essential to their...

View Article

Legal impact on cybersecurity in 2025: new developments and challenges in the EU

In the fast-paced world of cybersecurity, 2025 is shaping up to be a crucial year for the implementation of new regulations aimed at strengthening the European Union’s digital resilience. From the...

View Article


VMware plugs a high-risk vulnerability affecting its Windows-based...

Broadcom is warning customers of a high-severity, authentication bypass flaw, now fixed, affecting VMWare Tools for Windows. Tracked as CVE-2025-22230, the issue stems from improper access control and...

View Article

Image may be NSFW.
Clik here to view.

Mit GenAI zum Insider-Threat

Viele Unternehmen haben nicht auf dem Schirm, welche Sicherheitsprobleme durch die Nutzung von GenAI entstehen.Teerachai Jampanak – Shutterstock.com Einer Analyse von Netskope zufolge sind...

View Article


Image may be NSFW.
Clik here to view.

KI-Agenten erobern die Cybersicherheitsbranche

Microsoft führt KI-Agenten ein, um die Cybersicherheit angesichts zunehmender Bedrohungen zu automatisieren.Denis Linine – shutterstock.com KI-Agenten, die in der Lage sind, Code auszuführen und...

View Article

Even anti-scammers get scammed: security expert Troy Hunt pwned by phishing...

Troy Hunt, the security researcher behind the popular “Have I Been Pwned?” data breach notification site has fallen victim to a phishing attack that exposed the email addresses of subscribers to...

View Article


Die 10 häufigsten IT-Sicherheitsfehler

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2491155871.jpg?quality=50&strip=all 12500w,...

View Article

7 cutting-edge encryption techniques for reimagining data security

Secret codes have been around for hundreds of years. Everyone from pirates to diplomats have used them to lock away messages from prying eyes. In recent years, mathematicians have built even better...

View Article

Image may be NSFW.
Clik here to view.

Diese Unternehmen hat es schon erwischt

Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind.Roman Samborskyi | shutterstock.com Sie denken, Ihre Sicherheitsmaßnahmen können Sie langfristig vor...

View Article
Browsing all 1594 articles
Browse latest View live