
Chinesische Hacker haben über 1.000 SOHO-Geräte infiziert
Dutzende Cybercrime-Kampagnen mit Fokus auf Asien und die USA wurden als angebliche LAPD-Aktionen getarnt. FOTOGRIN – […]

LLMs are guessing login URLs, and it’s a cybersecurity time bomb
Large language models (LLMs) are casually sending users to the wrong web addresses, including unregistered, inactive, […]

Download the ‘AI-ready data centers’ spotlight report
Download the July 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]

Download the ‘AI-ready data centers’ spotlight report
Download the July 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]

AI supply chain threats loom — as security practices lag
The AI software supply chain is rapidly expanding to include not only open-source development tools but […]

CISOs must rethink defense playbooks as cybercriminals move faster, smarter
Last year nation-state incidents dominated cybersecurity headlines, as Chinese Typhoon threat groups and others made waves […]

PowerShell überwachen – so geht‘s
Wird PowerShell nicht richtig überwacht, ist das Security-Debakel meist nicht weit. rsooll | shutterstock.com Kriminelle Hacker […]

US DOJ makes progress combatting North Korean remote IT worker schemes
The US Justice Department is making progress in its battle against Democratic People’s Republic of North […]

Three steps to boost Amazon S3 data security
The amount of data in modern systems has skyrocketed beyond what traditional security tools can handle. […]

Scattered Spider nimmt Luftfahrtbranche ins Visier
Scattered Spider nutzt Social Engineering statt Brute Force um sich Zugang zu verschaffen. VZ_Art – shutterstock.com […]