
EDR und XDR bleiben wichtig
EDR- und XDR-Systeme bieten umfassende Sicherheit und Transparenz für alle Endpunkte und Netzwerke in Ihrer IT-Infrastruktur. […]

Hartkodierte Zugangsdaten in Solarwinds-Software
University of College | shutterstock.com Hartkodierte Zugangsdaten im Quellcode der Asset-Management- und IT-Ticketing-Software “Web Help Desk” […]

Crowdstrike wehrt sich gegen Action1-Gerüchte
Crowdstrike und Action1 würden grundsätzlich gut zusammenpassen. Nach den neuesten Kommunikationseskapaden wird das aber wohl nichts […]

Fidelis Network Detection and Response (NDR): Proactive Cyber Defense for Evolving Threats
As cyberattacks are becoming more sophisticated, traditional security measures such as firewalls and intrusion detection systems […]

Encryption backdoor debates rage across the planet, promising a difficult 2025 for CISOs
Compliance rules requiring encryption backdoors — not just for attachments, but for text; not just for […]

Cybersecurity bill could make ransomware payment reporting mandatory
The Australian Federal Government has introduced the Cyber Security Bill 2024 to Parliament proposing the country’s […]

Microsoft October update patches two zero-day vulnerabilities it says are being actively exploited
The drama of Patch Tuesday often revolves around zero days, which in October’s haul of 117 […]

Understanding Common Plumbing Issues and How to Resolve Them
IntroductionPlumbing issues are one of the most common household problems that can range from minor inconveniences […]

The CISO’s guide to establishing quantum resilience
Pundits evangelize the benefits and challenges enterprises will face in a post-quantum era, but much still […]

APT group GoldenJackal deploys backdoors to air-gapped systems
Cyberespionage group GoldenJackal, known to target government and diplomatic entities, has updated its toolset to include […]