Stopping Forensic Tools
TL;DR This guide shows you how to make it harder for someone trying to investigate your […]
Stop Phishing: A Practical Guide
TL;DR This guide gives you simple steps to protect yourself and your organisation from phishing attacks. […]
Spotting Phishing Emails: A User Guide
TL;DR Phishing emails try to trick you into giving away personal information. This guide shows you […]
Google-Antigravity-Lücke: KI-Coding-Tool anfällig für Angriffe
Eine Sicherheitslücke in Googles KI-Coding-Tool Antigravity erlaubt es Angreifern, Schadcode einzuschleusen. Koshiro K – shutterstock.com Anfang […]
RomCom tries dropping a not-so-romantic payload on Ukraine-linked US firms
US firms with ties to projects supporting Ukraine are being targeted by the Russia-aligned RomCom group, […]
Scattered Lapsus$ Hunters target Zendesk users with fake domains
Scattered Lapsus$ Hunters targeted Zendesk users through more than 40 fake domains designed to steal credentials […]
Spotlight: Making the most of multicloud
Download the December 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]
The CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we […]
7 Security-Praktiken zum Abgewöhnen
Aus der Zeit gefallen? Sergio Delle Vedove | shutterstock.com Schlechte Angewohnheiten abzustellen (oder bessere zu entwickeln), […]
Empathetic policy engineering: The secret to better security behavior and awareness
In many companies, IT security guidelines encounter resistance because employees perceive them as obstructive or impractical. […]