News

A US federal program exposed surveillance hardware hidden inside OT systems; cyber experts are warning that this is just the ...
Concerns are raised that agencies would find ways around the rule, that attackers would be vindictive and attack more aggressively, and that politicians would fold under threat.
World Leaks represents a significant shift in the ransomware ecosystem, moving away from file encryption toward pure data ...
CISA has mandated immediate mitigation for federal agencies, while analysts urge enterprises to accelerate cloud migration ...
DLL-based malware targets Windows users after a phishing campaign tricked the maintainer into leaking a token.
FIDO-Schlüssel verwenden eine hardwarebasierte Multi-Faktor-Authentifizierung, um Schwachstellen anderer MFA-Methoden zu beheben. Der berüchtigten Krypto-Hackergruppe PoisonSeed ist es jedoch offenbar ...
Der Hackerangriff auf die Klinikgruppe Ameos beschäftigt den Konzern weiterhin. Möglicherweise wurden auch Patientendaten ...
Microsoft’s support model — in which China-based engineers relay commands to US-based personnel with national security ...
The time for excusing bad behavior because someone has ‘CISO’ in their title is over. We need to stop worshiping influence ...
Human risk is concentrated, not widespread: Just 10% of employees are responsible for nearly three-quarters (73%) of all ...
Die Umsetzung der NIS2-Richtlinie ist eine schwere Geburt, die weiterhin andauert. Trotzdem haben Unternehmen keine Zeit zu verlieren – im Gegenteil.
Recent cyberattacks deploying the potent Authentic Antics malware tool to target Microsoft cloud accounts were the handiwork ...