OpenAI expands ‘defense in depth’ security to stop hackers using its AI models to launch cyberattacks
OpenAI is preparing for the possibility that threat groups will try to abuse its increasingly powerful […]
Meet ConsentFix, a new twist on the ClickFix phishing attack
A new variation of the ClickFix scam tries to get around phishing defenses by capturing an […]
Wie im Netz gezielt manipuliert wird
Cyberkriminelle nutzen SIM-Karten vom Graumarkt für virtuelle Bot-Armeen. K2LStudio – shutterstock.com Ein umfangreicher internationaler Graumarkt mit […]
SAML authentication broken almost beyond repair
Researchers have uncovered fresh techniques for breaking SAML-based authentication, further undermining the security assurances offered by […]
Battering RAM hardware hack breaks secure CPU enclaves
Confidential computing, powered by hardware technologies such as Intel SGX (Software Guard Extensions) and AMD SEV […]
Cybersecurity isn’t underfunded — It’s undermanaged
Much of the narrative I come across online around cybersecurity budgets revolves around convincing the Board […]
Ivantis EPM-Systeme anfällig für Angriffe
Unternehmen sollten ihre EPM-Systeme von Ivanti so bald wie möglich patchen, da dort schwerwiegende Sicherheitslücken entdeckt […]
How to justify your security investments
In modern corporate environments, investments in security technologies are no longer judged solely on technical maturity. […]
Mit MXDR gegen den Fachkräftemangel
Mit dem Einsatz von MXDR können Unternehmen ihr IT-Security-Team durch Experten erweitern und deren Expertise nutzen. […]
Fortinet admins urged to update software to close FortiCloud SSO holes
Admins using FortiCloud SSO (single sign on) to authenticate access to Fortinet products are urged to […]