Don't let mistakes bother you

If you don't care, you may become a victim of spam

Trump revokes security clearances for Chris Krebs, SentinelOne in problematic precedent for security vendors

In an ominous development for the cybersecurity industry, US President Donald Trump revoked the security clearance […]

Security-KPIs und -KRIs: So messen Sie Cybersicherheit

Cybersicherheit zu messen, ist kein Kinderspiel. Foto: Ultraskrip – shutterstock.com Eine wichtige Säule jedes ausgereiften Cyberrisk-Programms […]

Targeted phishing gets a new hook with real-time email validation

Crooks behind some credential-stealing phishing campaigns are trying to increase their success rate by sophisticated targeting. […]

Google launches unified enterprise security platform, announces AI security agents

Google has launched a new enterprise security platform called Google Unified Security that combines the company’s […]

Securing Endpoints with MITRE ATT&CK: From Theory to Practice

MITRE ATT&CK has become the go-to knowledge base for understanding how attackers operate since 2013. The […]

WK Kellogg informiert über Datendiebstahl

Der für seine Cornflakes bekannte Lebensmittelkonzern WK Kellogg wurde um Daten beraubt. Framarzo – shutterstock.com WK […]

Whatsapp plugs bug allowing RCE with spoofed filenames

Meta is warning Whatsapp users of an issue affecting its Windows rollouts that could allow attackers […]

Lessons learned about cyber resilience from a visit to Ukraine

During a visit to the recent Kyiv International Cyber Resilience Forum 2025 in Ukraine, I encountered […]

Is HR running your employee security training? Here’s why that’s not always the best idea

In today’s fast-changing threat landscape, relying solely on human resources to deliver employee security training can […]

9 unverzichtbare Open Source Security Tools

Diese Open-Source-Tools adressieren spezifische Security-Probleme – mit minimalem Footprint. Foto: N Universe | shutterstock.com Cybersicherheitsexperten verlassen […]

1 14 15 16 17 18 143