Data on sale: Trump administration withdraws data broker oversight proposal
The US Consumer Financial Protection Bureau has withdrawn a proposed rule that would have restricted data […]
The most effective phishing QR code is a new drug and alcohol policy supposedly from HR
Phishing emails that appear to be internal and come from the IT or HR department are […]
‘Aggressive, creative’ hackers behind UK breaches now eyeing US retailers
Google has warned that a hacking group linked to “Scattered Spider,” which is believed to be […]
Hacker nehmen Rüstungslieferanten der Ukraine ins Visier
Russische Hacker greifen gezielt Rüstungsfirmen an, die die Ukraine mit Waffen versorgen. PeopleImages.com – Yuri A […]
How phones get hacked: 7 common attack methods explained
The smartphone revolution was supposed to provide a second chance for the tech industry to roll […]
Die acht wichtigsten Sicherheitsmetriken
Je schneller Schwachstellen entdeckt werden, desto geringer der Schaden. Das zahlt sich für alle aus. Pressmaster […]
Ivanti patches two EPMM flaws exploited in the wild
IT software company Ivanti released emergency patches for its enterprise mobile device management (MDM) solution after […]
How Deception Fits into Zero Trust and MITRE Shield Frameworks
A technical analysis of deception technology’s role in modern cybersecurity frameworks In today’s evolving threat landscape, […]
Neue EU-Schwachstellen-Datenbank geht an den Start
Die neue EU-Schwachstellen-Datenbank EUVD soll das CVE-Programm ergänzen. artjazz – shutterstock.com Seit dieser Woche verfügt die […]
CISA adds the notorious TeleMessage flaw to KEV list
CISA has added a medium-severity vulnerability discovered in TeleMessage TM SGNL, the messaging application that was […]