Don't let mistakes bother you

If you don't care, you may become a victim of spam

Cybercriminals set sites on identities

Eye Security’s 2026 State of Incident Response Report shows that cyberattacks on companies are increasingly going undetected, […]

Should I stay or should I go?

Even the most seasoned CISOs sometimes run into insurmountable roadblocks at their organizations. Despite their best […]

Die besten DAST- & SAST-Tools

Tools für Dynamic und Static Application Security Testing helfen Entwicklern, ihren Quellcode zu härten. Wir zeigen […]

Inside Cloud Malware Analysis: Techniques and Real-World Use Cases

Key Takeaways Cloud malware avoids files, running in memory and abusing cloud-native services to evade legacy […]

Cyberrisiko Ruhestand

Wenn OT-Fachkräfte in den Ruhestand gehen, droht ein massiver Wissensverlust. Das kann erhebliche Folgen für die […]

From credentials to cloud admin in 8 minutes: AI supercharges AWS attack chain

Threat actors tore through an Amazon Web Services environment in under eight minutes, chaining together credential […]

Notepad++ infrastructure hijacked by Chinese APT in sophisticated supply chain attack

The popular open-source text editor Notepad++ was targeted in a sophisticated supply chain attack that allowed […]

Think agentic AI is hard to secure today? Just wait a few months

Early experimentation with agentic AI has given CISOs a preview of the possible cybersecurity nightmares ahead. […]

Shai-Hulud & Co.: The software supply chain as Achilles’ heel

Today’s applications are based on numerous components, each of which, along with the development environments themselves, […]

Was tun, wenn die Erpresser kommen?

Ruhe bewahren und keine übereilten Sachen machen, empfiehlt Podcast-Gast Joanna Lang-Recht. intersoft consulting services AG Montagmorgen, […]

1 45 46 47 48 49 373