Roughly half of employees are using unsanctioned AI tools, and enterprise leaders are major culprits
Shadow AI, the secret, unapproved use of AI by employees, isn’t going away. In fact, workers […]
ShinyHunters ramp up new vishing campaign with 100s in crosshairs
Notorious extortion group ShinyHunters released tens of GB of files it claims to have stolen from […]
Identitäten im Fokus von Cyberkriminellen
Cyberkriminelle haben es inzwischen vermehrt auf digitale Identitäten abgesehen. khunkornStudio – shutterstock.com Der State of Incident […]
Critical RCE bugs expose the n8n automation platform to host‑level compromise
Two critical sandbox escape flaws in the popular n8n workflow automation platform are allowing authenticated users […]
CISA chief uploaded sensitive government files to public ChatGPT
The acting director of the US Cybersecurity and Infrastructure Security Agency uploaded sensitive government contracting documents […]
EU’s answer to CVE solves dependency issue, adds fragmentation risks
The security community has offered broad support for the creation of an EU-hosted vulnerability database as […]
Reports of GDPR violations have risen sharply
According to a recent report by law firm DLA Piper, organizations are increasingly being reported for violations of […]
Kritik am Kritis-Dachgesetz: “Flickenteppich” befürchtet
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?quality=50&strip=all 2500w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=150%2C84&quality=50&strip=all 150w, […]
NIST’s AI guidance pushes cybersecurity boundaries
For years, US cybersecurity guidance rested on a reassuring premise: New technologies introduce new wrinkles, but […]
Designing an End-to-End Data Protection Architecture
In a period characterized by the acceleration of digital faster, more regulatory bodies and constant cyber […]