Risiken bei der Wiederherstellung nach Ransomware-Angriffen
Die Zahlung des Lösegelds nach einer Ransomware-Attacke ist keine Garantie für eine reibungslose oder gar erfolgreiche […]
Europol has put an end to network behind 49 million fake accounts
On October 10, Europol, in cooperation with police authorities in Estonia, Finland, Latvia and Austria, raided […]
Cross-platform ransomware: Qilin weaponizes Linux binaries against Windows hosts
Agenda ransomware group, popularly known as Qilin, has been abusing legitimate remote management and file transfer […]
Data sovereignty proof: How to verify controls like ‘Project Texas’
As data sovereignty laws fracture the global internet, CSOs are scrutinizing ambitious new compliance blueprints, with […]
The 10 biggest issues CISOs and cyber teams face today
The CISO job is tough, and it’s getting tougher: 66% of security leaders surveyed for the […]
CryptoBind’s quantum ready approach to DPDP compliance
The Digital Personal Data Protection (DPDP) Act 2023 of India is a turning point in the […]
Die besten IAM-Tools
Identity & Access Management ist für sicherheitsbewusste Unternehmen im Zero-Trust-Zeitalter Pflicht. Das sind die besten IAM-Anbieter […]
Scammers try to trick LastPass users into giving up credentials by telling them they’re dead
Are you sure you’re still alive? If so, you may fall for a phishing scam aimed […]
Critical Microsoft WSUS flaw exploited in wild after insufficient patch
Microsoft released out-of-band patches on Thursday to “comprehensively” fix a critical vulnerability in the Windows Server […]
Agentless Network Monitoring: The New Standard for Cloud Security Visibility
How does agentless network monitoring work in cloud environments? Agentless network monitoring represents a fundamental shift in cloud […]