Akira ransomware expands to Nutanix AHV, raising stakes for enterprise security
The Cybersecurity and Infrastructure Security Agency (CISA), along with the FBI and several international partners, has […]
North Korea’s ‘Job Test’ trap upgrades to JSON malware dropboxes
North Korea-linked Contagious Interview campaign is now luring developers with trojanized coding tasks and pulling obfuscated […]
India’s new data privacy rules turn privacy compliance into an engineering challenge
India has notified its Digital Personal Data Protection (DPDP) Rules, 2025, introducing strict consent and data […]
Gipfel in Berlin – Europa strebt digitale Souveränität an
Am 18. November 2025 findet der Summit on European Digital Sovereignty in Berlin statt. mr_tigga – shutterstock.com […]
The rise of the chief trust officer: Where does the CISO fit?
CISOs may soon find themselves operating alongside a new colleague, the chief trust officer, as more […]
ISO and ISMS: 9 reasons security certifications go wrong
ISO certifications, as well as the implementation of an Information Security Management System (ISMS) based on IT […]
Empathie trifft IT-Sicherheit: Der Weg zu gelebter Compliance
CISOs sollten Sicherheitsrichtlinien mit Blick auf die Belegschaft gestalten. earthphotostock – shutterstock.com In vielen Unternehmen stoßen […]
Was ist Social Engineering?
Mit Social-Engineering-Techniken manipulieren Cyberkriminelle die menschliche Psyche. Lesen Sie, wie das funktioniert und wie Sie sich […]
Spam flooding npm registry with token stealers still isn’t under control
A coordinated token farming campaign continues to flood the open source npm registry, with tens of […]
From detection to response: Why confidence is the real game changer
Cybersecurity often feels like a race where you don’t know when the starting gun will fire. […]