EOL-Software gefährdet Unternehmenssicherheit
Geräte mit End-of-Life-Software (EOL) stellen nach wie vor ein weit verbreitetes Sicherheitsproblem in Unternehmen dar. tookitook […]
Rogue MCP servers can take over Cursor’s built-in browser
AI agents and coding copilots are shaking up how — and what — developers code. But […]
Operation Endgame schaltet Schadsoftware ab
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/11/endgame2025_buehne.png?quality=50&strip=all 1521w, https://b2b-contenthub.com/wp-content/uploads/2025/11/endgame2025_buehne.png?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/11/endgame2025_buehne.png?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/11/endgame2025_buehne.png?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/11/endgame2025_buehne.png?resize=1238%2C697&quality=50&strip=all 1238w, https://b2b-contenthub.com/wp-content/uploads/2025/11/endgame2025_buehne.png?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/11/endgame2025_buehne.png?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/11/endgame2025_buehne.png?resize=640%2C360&quality=50&strip=all 640w, […]
Zero-day exploits hit Cisco ISE and Citrix systems in an advanced campaign
The Amazon Threat Intelligence team has now disclosed an advanced persistent threat (APT) campaign that exploited […]
What CISOs need to know about new tools for securing MCP servers
Model Context Protocol allows AI agents to connect to data sources but the first iteration of […]
Compliance Milestones Arrive: DORA and PCI DSS 4.0 in Effect, PQC Next on the Horizon
The financial institutions regulatory environment has taken a new dimension of intensity. As the Digital Operational […]
Google asks US court to shut down Lighthouse phishing-as-a-service operation
Google is asking to a US court for help in dismantling the infrastructure behind the Lighthouse […]
Wie ChatGPT sich selbst eine Prompt Injection zufügt
Forscher haben neue Methoden für Angriffe über ChatGPT aufgedeckt. PhotoGranary02 – shutterstock.com Forscher des Sicherheitsunternehmens Tenable […]
Miniatur Wunderland Hamburg warnt vor Datendiebstahl
Der Ticketshop des Miniatur Wunderland Hamburg wurde offenbar gehackt. JHVEPhoto – shutterstock.com Das Miniatur Wunderland Hamburg […]
UK cybersecurity bill brings tougher rules for critical infrastructure
The UK government has introduced a new legislation to harden national cyber defenses across critical infrastructure, […]