KI als Turbo für Kriminelle
width="2500" height="1406" sizes="(max-width: 2500px) 100vw, 2500px">Europol warnt: Kriminelle nutzen KI, um ihre Operationen zu automatisieren und zu verstärken.Golden Dayz – shutterstock.com Von...
View ArticleOracle Cloud breach may impact 140,000 enterprise customers
A threat actor has reportedly breached Oracle Cloud infrastructure, exfiltrating six million sensitive authentication records and potentially endangering more than 140,000 enterprise customers. The...
View ArticleFBI warns: beware of free online document converter tools
Improvements Microsoft has made to Office document security that disable macros and other embedded malware by default has forced criminals to up their innovation game, a security expert said Monday....
View ArticleQuantenschlüssel aus der Sicht des CISO
loading="lazy" width="400px">Quantum Key Distribution (QKD) dient dazu, Verschlüsselungsschlüssel sicher zwischen zwei Parteien zu verteilen.Shaiith – shutterstock.com Der sogenannte Q-Day, an...
View Article11 ways cybercriminals are making phishing more potent than ever
Phishing has long been a primary source for security breaches — a major issue that, despite years of security awareness training, remains a top cybersecurity concern today. But thanks to refinements...
View ArticleMicrosoft launches AI agents to automate cybersecurity amid rising threats
Microsoft has introduced a new set of AI agents for its Security Copilot platform, designed to automate key cybersecurity functions as organizations face increasingly complex and fast-moving digital...
View ArticleNew VanHelsing ransomware claims three victims within a month
A new ransomware-as-a-service (RaaS) affiliate program, VanHelsing, is rapidly gaining traction, with its operators successfully targeting three victims within a month of its launch on March 7....
View ArticleNeue VanHelsing-Ransomware breitet sich rasant aus
width="3200" height="1800" sizes="(max-width: 3200px) 100vw, 3200px">Das neue Ransomware-Programm VanHelsing zielt auf Windows-, Linux-, BSD-, ARM- und ESXi-Systeme.Andrey_Popov – shutterstock.com...
View ArticleWarning for developers, web admins: update Next.js to prevent exploit
Developers and web admins using the Next.js framework for building or managing interactive web applications should install a security update to plug a critical vulnerability. The vulnerability,...
View ArticleCritical RCE flaws put Kubernetes clusters at risk of takeover
The Kubernetes project has released patches for five vulnerabilities in a widely used popular component called the Ingress NGINX Controller that’s used to route external traffic to Kubernetes...
View Article9 Dinge, die CISOs den Job kosten
Sie können nicht sagen, wir hätten Sie nicht gewarnt… Foto: Anton Vierietin | shutterstock.comCISOs und andere Executives im Bereich IT-Sicherheit arbeiten im Regelfall hart daran, ihr Unternehmen –...
View ArticleRising attack exposure, threat sophistication spur interest in detection...
Detection engineering, which was once a niche practice among mostly large companies, appears to have evolved into a capability that organizations across industries now consider essential to their...
View ArticleLegal impact on cybersecurity in 2025: new developments and challenges in the EU
In the fast-paced world of cybersecurity, 2025 is shaping up to be a crucial year for the implementation of new regulations aimed at strengthening the European Union’s digital resilience. From the...
View ArticleVMware plugs a high-risk vulnerability affecting its Windows-based...
Broadcom is warning customers of a high-severity, authentication bypass flaw, now fixed, affecting VMWare Tools for Windows. Tracked as CVE-2025-22230, the issue stems from improper access control and...
View ArticleMit GenAI zum Insider-Threat
Viele Unternehmen haben nicht auf dem Schirm, welche Sicherheitsprobleme durch die Nutzung von GenAI entstehen.Teerachai Jampanak – Shutterstock.com Einer Analyse von Netskope zufolge sind...
View ArticleKI-Agenten erobern die Cybersicherheitsbranche
Microsoft führt KI-Agenten ein, um die Cybersicherheit angesichts zunehmender Bedrohungen zu automatisieren.Denis Linine – shutterstock.com KI-Agenten, die in der Lage sind, Code auszuführen und...
View ArticleEven anti-scammers get scammed: security expert Troy Hunt pwned by phishing...
Troy Hunt, the security researcher behind the popular “Have I Been Pwned?” data breach notification site has fallen victim to a phishing attack that exposed the email addresses of subscribers to...
View ArticleDie 10 häufigsten IT-Sicherheitsfehler
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/03/shutterstock_2491155871.jpg?quality=50&strip=all 12500w,...
View Article7 cutting-edge encryption techniques for reimagining data security
Secret codes have been around for hundreds of years. Everyone from pirates to diplomats have used them to lock away messages from prying eyes. In recent years, mathematicians have built even better...
View ArticleDiese Unternehmen hat es schon erwischt
Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind.Roman Samborskyi | shutterstock.com Sie denken, Ihre Sicherheitsmaßnahmen können Sie langfristig vor...
View Article