View the latest threats and global cybersecurity news.
Let’s be honest folks, vulnerability management isn’t the same game it was five years ago. But if you’re still running periodic scans, […]
Reporting to the CFO instead of the CIO can help CISOs frame cybersecurity in business terms, position cybersecurity as more than a cost center, and […]
Das britische Traditionsunternehmen Marks & Spencer wurde offenbar von Cyberkriminellen heimgesucht.WD Stock Photos | shutterstock.com Wie […]
G Data warnt davor, die Komplexität heutiger Bedrohungsszenarien zu unterschätzen.Pictrider – shutterstock.com Geht es um Cybersicherheit, […]
Attackers have been exploiting a critical zero-day vulnerability in the Visual Composer component of the SAP NetWeaver application server since early […]
An Israeli vendor was able to evade several leading Linux runtime security tools using a new proof-of-concept (PoC) rootkit that it claims reveals […]
Eine Koalition einflussreicher CISOs sieht den G7-Gipfel 2025 als ideale Gelegenheit, die G7- und OECD-Mitgliedsstaaten zu einer stärkeren […]
Commvault is warning customers of a critical vulnerability affecting Command Center, a web-based management console for its data protection and […]
Enterprise security teams face an immediate escalation in phishing threats as the notorious Darcula toolkit has now started weaponizing generative AI […]
loading="lazy" width="400px">Ransomware-Attacken werden immer mehr. Höchste Zeit, die Schutzmaßnahmen hochzufahren.Zephyr_p – […]
Third-party involvement in breaches and exploitation of vulnerabilities have become more important factors in security breaches, according to the […]
Risk management is the process of identifying, analyzing, and mitigating uncertainties and threats that can harm your organization. That’s a […]
Das Portal von guenstiger.de ist online – was die Hacker jedoch im Backend angerichtet haben, darüber liegen noch keine Informationen vor. […]
Mit Hilfe von Cyber Risk Assessments können CISOs nicht nur das konkrete Risiko im Unternehmen ermitteln, sondern auch den Erfolg ihrer Arbeit […]
CISOs can learn two lessons from a US health insurance provider’s admission this month that misconfiguring Google Analytics led to the disclosure […]
Weeks after BIOS developer AMI released an update fixing a critical vulnerability in its MegaRAC baseband management controller (BMC) firmware used […]
80 Prozent der Cyberangriffe beginnen mit kompromittierten Zugangsdaten und einem Active Directory.Andrey_Popov – shutterstock.com Cybertools um […]
Deleted files within public GitHub repositories could still be exposing secrets like API keys, tokens, and credentials, if threat actors knew where […]
The 2025 RSA Conference is right around the corner, certain to be buzzing with marketing propaganda, intriguing innovations, and bold claims as […]
Cohesity, a data protection company, held its first press conference in Korea since its merger with Veritas and began to make full-fledged inroads […]
A whistleblower at the National Labor Relations Board (NLRB) alleged last week that denizens of Elon Musk's Department of Government Efficiency […]
A security architect with the National Labor Relations Board (NLRB) alleges that employees from Elon Musk's Department of Government Efficiency […]
A critical resource that cybersecurity professionals worldwide rely on to identify, mitigate and fix security vulnerabilities in software and […]
President Trump last week revoked security clearances for Chris Krebs, the former director of the Cybersecurity and Infrastructure Security Agency […]
China-based purveyors of SMS phishing kits are enjoying remarkable success converting phished payment card data into mobile wallets from Apple and […]
Microsoft today released updates to plug at least 121 security holes in its Windows operating systems and software, including one vulnerability that […]
A Minnesota cybersecurity and computer forensics expert whose testimony has featured in thousands of courtroom trials over the past 30 years is […]
In an address to Congress this month, President Trump claimed he had "brought free speech back to America." But barely two months into his second […]
Many successful phishing attacks result in a financial loss or malware infection. But falling for some phishing scams, like those currently targeting […]
Authorities in at least two U.S. states last week independently announced arrests of Chinese nationals accused of perpetrating a novel form of […]
2.5 million people were affected, in a breach that could spell more trouble down the line.
Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.
Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.
Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount […]
CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.
Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.
Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under […]
An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.