Securing the Semiconductor Supply Chain: 2025 Landscape
In 2025, the semiconductor supply chain in the world is at its most volatile. Having been […]
GPT-5 ist geknackt
Die Grenzen von KI-Modellen lassen sich mit relativ einfachen Mitteln überwinden, wie der Jailbreak von GPT-5 […]
10 most powerful cybersecurity companies today
Geopolitical unrest. Uncertainty about tariffs. A tough regulatory climate. Heightened concerns about AI-generated attacks. Add it […]
Schwachstellen managen: Die besten Vulnerability-Management-Tools
Schwachstellen zu managen, muss keine Schwerstarbeit sein. Wenn Sie die richtigen Tools einsetzen. Das sind die […]
Citrix NetScaler flaw likely has global impact
Attackers are exploiting a Citrix NetScaler vulnerability to breach critical organizations, notably in the Netherlands, but […]
August Patch Tuesday: Authentication hole in Windows Server 2025 now has a fix
A critical zero-day vulnerability in Windows servers running the Kerberos authentication system, first disclosed in May, […]
How to Strengthen Your Corporate Security with Military-Grade Cyber Warfare Tactics?
Every organization faces a threat landscape that evolves as quickly as military battlefields do. By borrowing […]
GPT-5 jailbroken hours after launch using ‘Echo Chamber’ and Storytelling exploit
Just hours after OpenAI dropped GPT-5, the newest brain behind ChatGPT, researchers busted it with a […]
Digitale Souveränität für Deutschland vorerst unerreichbar
BSI-Präsidentin Plattner: “Wir haben technologische Abhängigkeiten an ganz vielen Stellen.” Jan Waßmuth Seine Abhängigkeit von Cloud-Lösungen, […]
5 key takeaways from Black Hat USA 2025
Transformational developments in cybersecurity and agentic AI were front and center during presentations and product announcements […]