Don't let mistakes bother you

If you don't care, you may become a victim of spam

Salesforce’s glaring Dreamforce omission: Vital security lessons from Salesloft Drift

Salesforce’s flagship Dreamforce conference last week offered attendees a range of sessions on best practices for […]

CAASM and EASM: Top 12 attack surface discovery and management tools

Cyber asset attack surface management (CAASM) or external attack surface management (EASM) solutions are designed to […]

Sendmarc appoints Dan Levinson as Customer Success Director in North America

Sendmarc has announced the appointment of Dan Levinson as Customer Success Director – North America, furthering […]

Die besten Hacker-Filme

Vorsicht, dieses Film-Listicle kann zu Prokrastination verführen! Nomad Soul | shutterstock.com Security-Profis und -Entscheider mit Hang […]

Self-propagating worm found in marketplaces for Visual Studio Code extensions

A month after a self-propagating worm was discovered in the open source NPM code repository, a […]

Google kills its cookie killer

Privacy Sandbox, Google’s attempt to create an alternative to cookies, looks like it has reached the […]

Britisches Militär von Cyberattacke getroffen

Großbritannien wird immer häufiger Ziel von schwerwiegenden Cyberangriffen. Jetzt hat es das Militär getroffen. Pilotsevas – […]

AI-enabled ransomware attacks: CISO’s top security concern — with good reason

As ransomware attacks accelerate in speed and sophistication, 38% of security leaders rank AI-enabled ransomware as […]

Security patch or self-inflicted DDoS? Microsoft update knocks out key enterprise functions

An October 2025 Microsoft Windows security update is wreaking havoc on enterprises, impacting multiple systems with […]

CISOs’ security priorities reveal an augmented cyber agenda

Technology may be changing rapidly but one thing remains constant: It’s not an easy time to […]

1 2 3 264