Don't let mistakes bother you

If you don't care, you may become a victim of spam

Meet ConsentFix, a new twist on the ClickFix phishing attack

A new variation of the ClickFix scam tries to get around phishing defenses by capturing an […]

Wie im Netz gezielt manipuliert wird

Cyberkriminelle nutzen SIM-Karten vom Graumarkt für virtuelle Bot-Armeen. K2LStudio – shutterstock.com Ein umfangreicher internationaler Graumarkt mit […]

SAML authentication broken almost beyond repair

Researchers have uncovered fresh techniques for breaking SAML-based authentication, further undermining the security assurances offered by […]

Battering RAM hardware hack breaks secure CPU enclaves

Confidential computing, powered by hardware technologies such as Intel SGX (Software Guard Extensions) and AMD SEV […]

Cybersecurity isn’t underfunded — It’s undermanaged

Much of the narrative I come across online around cybersecurity budgets revolves around convincing the Board […]

Ivantis EPM-Systeme anfällig für Angriffe

Unternehmen sollten ihre EPM-Systeme von Ivanti so bald wie möglich patchen, da dort schwerwiegende Sicherheitslücken entdeckt […]

How to justify your security investments

In modern corporate environments, investments in security technologies are no longer judged solely on technical maturity. […]

Mit MXDR gegen den Fachkräftemangel

Mit dem Einsatz von MXDR können Unternehmen ihr IT-Security-Team durch Experten erweitern und deren Expertise nutzen. […]

Fortinet admins urged to update software to close FortiCloud SSO holes

Admins using FortiCloud SSO (single sign on) to authenticate access to Fortinet products are urged to […]

Making cybercrime illegal won’t stop it; making cybersec research legal may

Hacking into computer systems is illegal in many countries — even if you’re a cybersecurity researcher […]