Don't let mistakes bother you

If you don't care, you may become a victim of spam

DDoS-Attacken: Schlag gegen internationale Cyberkriminelle

DDos bleibt ein Evergreen unter den Security-Bedrohungen. Karsten Kunert mit ChatGPT In einem großangelegten Schlag gegen […]

The espionage reality: Your infrastructure is already in the collection path

Threat actors have always sought advantage over their targets. Recently we’ve seen two efforts designed for […]

Designing Scalable Microservices Without Creating a Mess

When it comes to designing scalable microservices, the goal is to create a system that can […]

Monolith vs Microservices in 2026: What Actually Works

As we delve into the world of software development in 2026, the debate between monolith vs […]

Die besten IAM-Tools

Identity & Access Management ist für sicherheitsbewusste Unternehmen im Zero-Trust-Zeitalter Pflicht. Das sind die besten IAM-Anbieter […]

CISA urges IT to harden endpoint management systems after cyberattack by pro-Iranian group

The US is urging infosec leaders to harden their endpoint management system configurations after last week’s […]

That cheap KVM device could expose your network to remote compromise

Researchers have found nine vulnerabilities in four popular low-cost KVM-over-IP devices, ranging from unauthenticated command injection […]

Ransomware group exploited Cisco firewall vulnerability as a zero day, weeks before a patch appeared

One of the world’s most active ransomware groups, Interlock, started exploiting a critical-rated Cisco firewall vulnerability […]

Beijing wants its own quantum-resistant encryption standards rather than adopt NIST’s

China is reportedly planning to develop its own national post-quantum cryptography standards within the next three […]

Telnet vulnerability opens door to remote code execution as root

A critical Telnet vulnerability with a CVSS rating of 9.8 enables attackers to take full control […]

1 2 3 366