EU-Kommission will DSGVO für KI und Cookie-Tracking lockern
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2645792213.jpg?quality=50&strip=all 4032w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2645792213.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2645792213.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2645792213.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2645792213.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2645792213.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2645792213.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2645792213.jpg?resize=150%2C84&quality=50&strip=all 150w, […]
North Korean hackers exploit Google’s safety tools for remote wipe
North Korea-linked threat actors have found a novel way to weaponize Google’s own security ecosystem, using […]
Senate moves to restore lapsed cybersecurity laws after shutdown
Two cybersecurity laws that lapsed during the government shutdown moved closer to restoration on Monday after […]
AI startups leak sensitive credentials on GitHub, exposing models and training data
Nearly two-thirds of the world’s top private AI companies have exposed API keys and access tokens […]
Öffentliche Verwaltung im Visier von Cyberspionen
Laut BSI haben es Cyberspione aktuell besonders auf die öffentliche Verwaltung abgesehen. Skorzewiak – shutterstock.com Cyberspione […]
Beyond silos: How DDI-AI integration is redefining cyber resilience
As organizations migrate toward hybrid and multi-cloud architectures, the boundaries between network and security operations have […]
Your passwordless future may never fully arrive
Enterprise CISOs have been trying to move beyond passwords for more than a decade, but have […]
How GlassWorm wormed its way back into developers’ code — and what it says about open source security
Pervasive, evasive malware thought to have been eliminated has wormed its way back into development environments. […]
Layered security: How SMBs can protect against sophisticated cyberthreats during the holiday season.
Small and medium-size businesses (SMBs) face a daunting cybersecurity landscape. With 29% of businesses with fewer […]
Stadtverwaltung Ludwigshafen kämpft mit IT-Ausfall
Die Stadtverwaltung Ludwigshafen wurde vermutlich von Hackern angegriffen. Deemerwha studio In Ludwigshafen sind derzeit weder die […]