Don't let mistakes bother you

If you don't care, you may become a victim of spam

Roughly half of employees are using unsanctioned AI tools, and enterprise leaders are major culprits

Shadow AI, the secret, unapproved use of AI by employees, isn’t going away. In fact, workers […]

ShinyHunters ramp up new vishing campaign with 100s in crosshairs

Notorious extortion group ShinyHunters released tens of GB of files it claims to have stolen from […]

Identitäten im Fokus von Cyberkriminellen

Cyberkriminelle haben es inzwischen vermehrt auf digitale Identitäten abgesehen. khunkornStudio – shutterstock.com Der State of Incident […]

Critical RCE bugs expose the n8n automation platform to host‑level compromise

Two critical sandbox escape flaws in the popular n8n workflow automation platform are allowing authenticated users […]

CISA chief uploaded sensitive government files to public ChatGPT

The acting director of the US Cybersecurity and Infrastructure Security Agency uploaded sensitive government contracting documents […]

EU’s answer to CVE solves dependency issue, adds fragmentation risks

The security community has offered broad support for the creation of an EU-hosted vulnerability database as […]

Reports of GDPR violations have risen sharply

According to a recent report by law firm DLA Piper, organizations are increasingly being reported for violations of […]

Kritik am Kritis-Dachgesetz: “Flickenteppich” befürchtet

srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?quality=50&strip=all 2500w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=150%2C84&quality=50&strip=all 150w, […]

NIST’s AI guidance pushes cybersecurity boundaries

For years, US cybersecurity guidance rested on a reassuring premise: New technologies introduce new wrinkles, but […]

Designing an End-to-End Data Protection Architecture

In a period characterized by the acceleration of digital faster, more regulatory bodies and constant cyber […]

1 48 49 50 51 52 373