View the latest threats and global cybersecurity news.
Japanese media company Nikkei has confirmed that a security breach of its Slack accounts has potentially leaked highly sensitive information from […]
Ein kompromittierter Rechner und schon hatten Kriminelle alles Nötige, um auf Nikkeis Slack-Plattform zuzugreifen.soraneko | shutterstock.com […]
A critical remote-code execution (RCE) flaw in the widely used @react-native-community/cli (and its server API) lets attackers run arbitrary OS […]
width="2496" height="1404" sizes="auto, (max-width: 2496px) 100vw, 2496px">Die Beschuldigten sollen zur Abwicklung von Zahlungen vier große […]
KI boomt auch unter Cyberkriminellen. Die ersten operativen Ergebnisse dieses Trends beleuchten Google-Sicherheitsforscher in einem aktuellen […]
When the world faced COVID-19, I watched something remarkable happen. Artificial intelligence (AI) systems, which I had once viewed as tools of […]
Chinese hackers have been spotted targeting European diplomats using a longstanding Windows shortcut vulnerability that’s been popular with threat […]
Research studies indicate that the average enterprise has between 40 and 80 separate security tools, a broad inventory that often leads to multiple […]
Bug bounty programs remain a crucial component of cybersecurity strategies in 2025, offering organizations the ability to draw in help from a diverse […]
Threat actors are now actively deploying AI-enabled malware in their operations. Google Threat Intelligence Group (GTIG) has identified […]
Aus Sicht von Forrester bleibt die Lage für IT-(Sicherheits-)Entscheider auch 2026 angespannt.Maya Lab /Shutterstock Keine Entwarnung für […]
For the past week, domains associated with the massive Aisuru botnet have repeatedly usurped Amazon, Apple, Google and Microsoft in Cloudflare's […]
Cyberespionage groups are always looking for novel ways to establish covert and long-term persistent access to compromised systems. The latest […]
The disclosure of a major security hole within a popular WordPress email plugin is a reminder to CISOs about the risks posed by relatively […]
Windows enterprise administrators will have until December 2027 at the latest to put in place alternatives to the security protection offered by […]
srcset="https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?quality=50&strip=all 7717w, […]
Windows-Sicherheitsprobleme haben beim Louvre-Museum scheinbar Tradition.Shutterstock / Phil Pasquini Das Louvre-Museum in Paris wurde im Oktober […]
Coming up with an accurate head count for cybersecurity startups is virtually impossible, with a new ventures popping up seemingly every day. And […]
Mit einer ISO 27001-Zertifizierung weisen Unternehmen nach, dass sie ein wirksames Informationssicherheits-Managementsystems (ISMS) betreiben. Lesen […]
In the old days, crooks followed transport trucks and hijacked them. Today they use phishing, vishing and identity theft to find and divert valuable […]
While tracking cyberattacks since last year, a Crowdstrike report also found that physical attacks and kidnappings have increased dramatically, […]
A Ukrainian man indicted in 2012 for conspiring with a prolific hacking group to steal tens of millions of dollars from U.S. businesses was arrested […]
Aisuru, the botnet responsible for a series of record-smashing distributed denial-of-service (DDoS) attacks this year, recently was overhauled to […]
Financial regulators in Canada this week levied $176 million in fines against Cryptomus, a digital payments platform that supports dozens of Russian […]
Cybercriminals are abusing a widespread lack of authentication in the customer service platform Zendesk to flood targeted email inboxes with menacing […]
Microsoft today released software updates to plug a whopping 172 security holes in its Windows operating systems, including at least three […]
The world's largest and most disruptive botnet is now drawing a majority of its firepower from compromised Internet-of-Things (IoT) devices hosted on […]
A cybercriminal group that used voice phishing attacks to siphon more than a billion records from Salesforce customers earlier this year has launched […]
U.S. prosecutors last week levied criminal hacking charges against 19-year-old U.K. national Thalha Jubair for allegedly being a core member of […]
At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals […]
2.5 million people were affected, in a breach that could spell more trouble down the line.
Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.
Over 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.
Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.
Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount […]
CISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.
Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.
Separate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat actors to take over devices and are under […]
An insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code execution and is under active attack.