Don't let mistakes bother you

If you don't care, you may become a victim of spam

Google researchers detect first operational use of LLMs in active malware campaigns

Threat actors are now actively deploying AI-enabled malware in their operations. Google Threat Intelligence Group (GTIG) […]

2026 – nichts für schwache CI(S)O-Nerven

Aus Sicht von Forrester bleibt die Lage für IT-(Sicherheits-)Entscheider auch 2026 angespannt. Maya Lab /Shutterstock Keine […]

Russian APT abuses Windows Hyper-V for persistence and malware execution

Cyberespionage groups are always looking for novel ways to establish covert and long-term persistent access to […]

WordPress plugin hole enables account takeover

The disclosure of a major security hole within a popular WordPress email plugin is a reminder […]

Office sandbox file security to disappear from enterprise Windows by late 2027, Microsoft confirms

Windows enterprise administrators will have until December 2027 at the latest to put in place alternatives […]

Office sandbox file security to disappear from enterprise Windows by late 2027, Microsoft confirms

Windows enterprise administrators will have until December 2027 at the latest to put in place alternatives […]

Fehlendes KI-Training wird zum Sicherheitsrisiko

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?quality=50&strip=all 7717w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

Louvre-Raubzug offenbart jahrzehntelanges Security-Versagen

Windows-Sicherheitsprobleme haben beim Louvre-Museum scheinbar Tradition.Shutterstock / Phil Pasquini Das Louvre-Museum in Paris wurde im Oktober […]

10 promising cybersecurity startups CISOs should know about

Coming up with an accurate head count for cybersecurity startups is virtually impossible, with a new […]

ISO und ISMS: Darum gehen Security-Zertifizierungen schief

Mit einer ISO 27001-Zertifizierung weisen Unternehmen nach, dass sie ein wirksames Informationssicherheits-Managementsystems (ISMS) betreiben. Lesen Sie, […]