
Überwachungssoftware infiziert gezielt Smartphones
Fingierte Messenger-Apps täuschen ihre Opfer und führen so freiwillig zur Installation der Schadsoftware. siro46 – shutterstock.com […]

CISOs rethink hiring to emphasize skills over degrees and experience
For decades security chiefs have trained their sights on job applicants with university degrees. But ongoing […]

SBOM erklärt: Was ist eine Software Bill of Materials?
Softwareentwicklung und Autoproduktion haben mehr gemein, als man denkt. Lesen Sie, was Sie zum Thema Software […]

The most dangerous time for enterprise security? One month after an acquisition
The period right after an acquisition closes is the most dangerous time for enterprise security, for […]

New ResolverRAT malware targets healthcare and pharma orgs worldwide
Security researchers have observed a new malware payload deployed in attacks against the healthcare and pharmaceutical […]

Cyberangriff kostet IKEA-Betreiber mehrere Millionen
Die Folgen des Ransomware-Angriffs auf den Franchise-Nehmer der IKEA-Filialen in Südosteuropa sind noch immer zu spüren. […]

China alleges US cyber espionage during the Asian Winter Games, names 3 NSA agents
China has accused the US of conducting more than 170,000 cyberattacks against the Asian Winter Games […]

Incomplete patching leaves Nvidia, Docker exposed to DOS attacks
A critical race condition bug affecting the Nvidia Container Toolkit, which received a fix in September, […]

Agentic AI is both boon and bane for security pros
Cybersecurity stands at a crossroads with agentic AI. Never have we had such a powerful tool […]

OT-Security: Warum der Blick auf Open Source lohnt
Auch im OT-Security-Bereich stellen Open-Source-Lösungen eine kostengünstige Alternative zu kommerziellen Tools dar. MY STOCKERS – Shutterstock.com […]