Don't let mistakes bother you

If you don't care, you may become a victim of spam

Digital health can’t scale if cybersecurity falls behind

When the world faced COVID-19, I watched something remarkable happen. Artificial intelligence (AI) systems, which I […]

Chinese hackers target Western diplomats using hard-to-patch Windows shortcut flaw

Chinese hackers have been spotted targeting European diplomats using a longstanding Windows shortcut vulnerability that’s been […]

What past ERP mishaps can teach CISOs about security platformization

Research studies indicate that the average enterprise has between 40 and 80 separate security tools, a […]

9 top bug bounty programs launched in 2025

Bug bounty programs remain a crucial component of cybersecurity strategies in 2025, offering organizations the ability […]

Quantum Computing & the Future of Tokenisation Security

The world of digital economy is becoming more and more uncertain with the balance between innovation […]

Google researchers detect first operational use of LLMs in active malware campaigns

Threat actors are now actively deploying AI-enabled malware in their operations. Google Threat Intelligence Group (GTIG) […]

2026 – nichts für schwache CI(S)O-Nerven

Aus Sicht von Forrester bleibt die Lage für IT-(Sicherheits-)Entscheider auch 2026 angespannt. Maya Lab /Shutterstock Keine […]

Russian APT abuses Windows Hyper-V for persistence and malware execution

Cyberespionage groups are always looking for novel ways to establish covert and long-term persistent access to […]

WordPress plugin hole enables account takeover

The disclosure of a major security hole within a popular WordPress email plugin is a reminder […]

Office sandbox file security to disappear from enterprise Windows by late 2027, Microsoft confirms

Windows enterprise administrators will have until December 2027 at the latest to put in place alternatives […]