External Attack Surface Management (EASM): Mit diesen vier Schritten...
IT-Security-Verantwortliche sollten die Angriffsfläche permanent analysieren und schützen. Dazu müssen sie stets im Blick haben, welche Assets über das Internet erreichbar sind. Foto: NicoElNino –...
View Article10 things you should include in your AI policy
The popularity of generative AI has created a tricky terrain for organizations to navigate. On the one hand, there is this transformative technology with the potential to reduce costs and increase...
View ArticleWhy DEI is key for a cyber safe future
Now more than ever, cybersecurity is a national security and international security imperative. As the US government rolls back support for diversity programs and shrinks the size of the federal...
View ArticleDiese Unternehmen hat es schon erwischt
Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind.Roman Samborskyi | shutterstock.com Sie denken, Ihre Sicherheitsmaßnahmen können Sie langfristig vor...
View ArticleChinese ToddyCat abuses ESET antivirus bug for malicious activities
China-backed APT group ToddyCat has been found exploiting a medium-severity vulnerability in ESET antivirus software to sneak malicious code onto vulnerable systems. Tracked as CVE-2024-11859, the...
View ArticleRansomware-Attacke auf Europcar
Europcar hat einen Cyberangriff mit Datendiebstahl erlitten.josera – shutterstock.com Im Darknet sind kürzlich Hinweise auf einen Cyberangriff bei Europcar aufgetaucht, bei dem Kundendaten und andere...
View ArticleApril Patch Tuesday news: Windows zero day being exploited, ‘big...
A threat actor is exploiting a zero-day elevation of privileges vulnerability in the Windows Common Log File System to deploy ransomware, one of a number of critical holes Microsoft plugged today as...
View ArticleUS bank regulator’s email system breached
A cyber intrusion at the US Office of the Comptroller of the Currency (OCC) is “massively serious” and comes at a time when “the good work done to improve cybersecurity in the US is under...
View Article9 unverzichtbare Open Source Security Tools
Diese Open-Source-Tools adressieren spezifische Security-Probleme – mit minimalem Footprint. Foto: N Universe | shutterstock.comCybersicherheitsexperten verlassen sich in diversen Bereichen auf...
View ArticleLessons learned about cyber resilience from a visit to Ukraine
During a visit to the recent Kyiv International Cyber Resilience Forum 2025 in Ukraine, I encountered a recurring theme across a plethora of speakers: always be flexible and keep your options open and...
View ArticleIs HR running your employee security training? Here’s why that’s not always...
In today’s fast-changing threat landscape, relying solely on human resources to deliver employee security training can leave an enterprise vulnerable. While HR excels at organizing and overseeing...
View ArticleWhatsapp plugs bug allowing RCE with spoofed filenames
Meta is warning Whatsapp users of an issue affecting its Windows rollouts that could allow attackers to perform remote code execution (RCE) on systems running the vulnerable releases. Tracked as...
View ArticleWK Kellogg informiert über Datendiebstahl
Der für seine Cornflakes bekannte Lebensmittelkonzern WK Kellogg wurde um Daten beraubt.Framarzo – shutterstock.com WK Kellogg, bekannt für seine Frühstücksprodukte wie Cornflakes und Frosties, teilte...
View ArticleGoogle launches unified enterprise security platform, announces AI security...
Google has launched a new enterprise security platform called Google Unified Security that combines the company’s visibility, threat detection, and incident response capabilities and makes it...
View ArticleTargeted phishing gets a new hook with real-time email validation
Crooks behind some credential-stealing phishing campaigns are trying to increase their success rate by sophisticated targeting. According to researchers at Cofense, instead of blasting out mass...
View ArticleSecurity-KPIs und -KRIs: So messen Sie Cybersicherheit
Cybersicherheit zu messen, ist kein Kinderspiel. Foto: Ultraskrip – shutterstock.comEine wichtige Säule jedes ausgereiften Cyberrisk-Programms ist die Fähigkeit, die Performance der IT-Security und...
View ArticleTrump revokes security clearances for Chris Krebs, SentinelOne in problematic...
In an ominous development for the cybersecurity industry, US President Donald Trump revoked the security clearance of former Cybersecurity and Infrastructure Security Agency (CISA) Director Chris...
View ArticleTop 16 OffSec, pen-testing, and ethical hacking certifications
Red team careers are in high demand, with companies seeking professionals skilled in penetration testing, offensive security (OffSec), and ethical hacking. To stand out in a competitive job market,...
View ArticleWhy Codefinger represents a new stage in the evolution of ransomware
If you didn’t pay much attention to news of the recent Codefinger ransomware attack, it’s probably because ransomware has become so prevalent that major incidents no longer feel notable. But...
View ArticleCISA under review: Trump memo spurs scrutiny and uncertainty
The Trump administration has issued a directive against Christopher Krebs, the founding director and former head of the Cybersecurity and Infrastructure Security Agency (CISA) for weaponizing and...
View Article