
Cyberangriff auf Colt: Support-Systeme nach Lösegelddrohung offline
Der TK-Konzern Colt kämpft seit einer Woche mit den Folgen einer Ransomware-Attacke. A9 STUDIO – shutterstock.com […]

ShinyHunters strike again: Workday breach tied to Salesforce-targeted social engineering wave
The cyberattack on enterprise software giant Workday’s CRM platform is likely part of a broader Salesforce-targeted […]

Ein Viertel der CISOs wird nach Ransomware-Angriff entlassen
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2588510909.jpg?quality=50&strip=all 7330w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2588510909.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2588510909.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2588510909.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2588510909.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2588510909.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2588510909.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/08/shutterstock_2588510909.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

Singapore issues critical alert on Dire Wolf ransomware targeting global tech and manufacturing firms
The Cyber Security Agency of Singapore (CSA) issued a critical alert on Monday, cautioning organizations about […]

Microsoft Entra Private Access brings conditional access to on-prem Active Directory
Attackers are increasingly targeting cloud resources, but that doesn’t mean they no longer see our on-premises […]

7 signs it’s time for a managed security service provider
A managed security service provider (MSSP) offers clients a comprehensive array of security services. Operating as […]
Fintech x Compliance: How to turn a headache into a competitive edge
Compliance is no longer an empty regulatory requirement, but it is a business necessity in the […]

Wie CISOs von der Blockchain profitieren
Die Blockchain macht Trust verifizierbar. everything possible | shutterstock.com Sicherheitsvorfälle gehen nicht nur auf eine Kompromittierung […]

Cryptoagility: the strategic pillar for digital resilience
In an increasingly dynamic digital environment exposed to emerging risks, security cannot rely solely on the […]

How UEBA Enhances Threat Detection Across the Network Layer
11 days. That’s the global median dwell time for attackers in 2024,down from 26 days when […]