Trotz Hinweise: Oracle dementiert Cyberattacke
width="2490" height="1400" sizes="(max-width: 2490px) 100vw, 2490px">Obwohl Sicherheitsforscher Hinweise für einen Datendiebstahl bei Oracle entdeckt haben, streitet das Unternehmen den Vorfall ab....
View ArticleMalicious npm packages found to create a backdoor in legitimate code
Attackers who target developers through malicious packages hosted on the npm repository are using a new persistence technique that involves backdooring legitimate packages already installed in...
View ArticleResearchers claim their protocol can create truly random numbers on a current...
A team that included researchers at a US bank says it has created a protocol that can generate certified truly random numbers, opening the possibility that current generation quantum computers can be...
View ArticleThe Trump administration made an unprecedented security mistake – you can...
If you are the custodian for sensitive information, you have no doubt been watching the inexplicable mishandling of the US military attack on Yemen by the senior members of the Trump administration...
View ArticleHow to create an effective crisis communication plan
Incident response isn’t the only challenge CISOs must face when confronted with a cyberattack. Corporate communications also plays a vital role in crisis management — and in ensuring the business...
View ArticleCIO des Jahres 2025 – Wettbewerb startet
Siegerinnen und Sieger des vergangenen Jahres jubeln über ihre CIO des Jahres Awards. Machen Sie mit und bewerben Sie sich – dann stehen Sie vielleicht im Oktober 2025 auf der großen Gala-Bühne und...
View ArticleSalt Typhoon may have upgraded backdoors for efficiency and evasion
The notorious China-backed APT group, Salt Typhoon, appears to have upgraded its arsenal with enhanced backdoors, even as the US cranks up the pressure on Chinese espionage. According to ESET...
View ArticleZu wenig Budget für OT-Security
width="2500" height="1406" sizes="(max-width: 2500px) 100vw, 2500px">Obwohl die Budgets für Cybersicherheit gestiegen sind, fehlt es oft an Investitionen für OT-Security.Aleksandr Grechanyuk –...
View ArticleUbuntu namespace vulnerability should be addressed quickly: Expert
Linux admins who have enabled the unprivileged user namespace restriction in their recent Ubuntu environments should take action to close three new vulnerabilities that allow a threat actor to bypass...
View ArticleAuthentifizierungslösungen: 10 Passwordless-Optionen für Unternehmen
Um Passwörter hinter sich zu lassen, gibt es bessere Lösungen. Wir zeigen Ihnen zehn. Foto: Raffi Ilham Pratama – shutterstock.comPasswörter sind seit Jahrzehnten der Authentifizierungsstandard für...
View ArticleThe CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have...
View ArticleHow CISOs can balance business continuity with other responsibilities
Cyber incidents, especially ransomware, are changing the way businesses assess risk and resiliency. As a result, what was once largely a CIO function is becoming that of a CISO, with them taking on...
View ArticleHacker wollten Arbeitslosengeld ergaunern
width="1936" height="1089" sizes="(max-width: 1936px) 100vw, 1936px">Die Bundesagentur hat Strafanzeige gestellt.Bundesagentur für Arbeit Bei der Bundesagentur für Arbeit ist es derzeit...
View ArticleHackerangriff auf MAN-Tochter
Cyberkriminelle haben offenbar die Systeme einer MAN-Tochter geknackt. Die Zentrale in München ist nach eigenen Angaben nicht davon betroffen.MAN Truck & Bus Die berüchtigte Ransomware-Bande...
View ArticleVolume of attacks on network devices shows need to replace end of life...
Two of the top three vulnerabilities that threat actors tried to leverage in 2024 were in end of life (EOL) network devices that manufacturers have stopped issuing patches for, says a new report....
View Article7 Wege, Daten (besser) zu verschlüsseln
Verschlüsseln Sie Ihre Daten zeitgemäß?JLStock | shutterstock.com Das Konzept der Kryptografie existiert schon ein paar Hundert Jahre, wird aber von findigen Wissenschaftlern und Mathematikern immer...
View Article6 hard-earned tips for leading through a cyberattack — from CSOs who’ve been...
An incident response plan is central to ensuring your organization is prepared for a cyberattack. But such documents, which detail steps that should be taken in the wake of various cyber scenarios,...
View ArticleInfostealer malware poses potent threat despite recent takedowns
Despite the takedown of Redline — the most prolific stealer of 2024 — and Meta Stealer in October 2024, the overall market and use of infostealers continue to rise, according to threat intel firm...
View ArticleAfter fake employees, fake enterprises are next hiring threat to corporate data
Chinese companies are trying to cut Taiwan’s lead in semiconductor technology by hiring away its best engineering talent through ‘front’ companies that hide their connections to China, the Taiwanese...
View ArticleLLMs are now available in snack size but digest with care
As large language models (LLMs) gain mainstream, they are pushing the edges on AI-driven applications, adding more power and complexity. Running these massive models, however, comes at a price. The...
View Article