Don't let mistakes bother you

If you don't care, you may become a victim of spam

Notable post-quantum cryptography initiatives paving the way toward Q-Day

The point at which quantum computers will be capable of breaking existing cryptographic algorithms — known […]

Nordkoreanische Cyberspione ködern Entwickler

Nordkoreanische Hacker werden immer kreativer, wenn es darum geht, Daten zu ergaunern FOTOGRIN – shutterstock.com Softwareentwickler […]

Over 80% of phishing sites now target mobile devices

Mobile-targeted phishing (M-ishing) attacks are seeing a significant rise with more than four out of every […]

Weltweite Störung bei Microsoft-Diensten

dennizn – shutterstock.com Am Dienstag (30. Juli) waren mehrere Dienste von Microsoft von einer weltweiten Netzwerkstörung […]

Make OT networks a priority, say nine national security agencies

To most people in IT, what happens inside operational technology (OT) networks is a bit of […]

DDoS attacks are increasingly targeting critical infrastructure

Critical infrastructure sectors including banking, financial services, government, and public utilities such as energy providers, experienced […]

Fix for BGP routing insecurity ‘plagued by software vulnerabilities’ of its own, researchers find

Resource Public Key Infrastructure (RPKI) is not yet the simple fix for the security weaknesses of […]

Critical Ivanti flaw exploited despite available patches

The US Cybersecurity and Infrastructure Security Agency (CISA) has warned Ivanti customers of active exploitation of […]

Meta partners with banks in the UK to combat online scams

Meta is working with banks in the UK to curb the menace of online frauds that […]

AI could provide the cyber-risk crystal ball every CISO needs

As much as cybersecurity professionals might prefer otherwise, ours is a field defined by reaction — […]