Don't let mistakes bother you

If you don't care, you may become a victim of spam

How AI is reshaping cybersecurity operations

Generative AI has become a pervasive tool in the enterprise. According to a recent Boston Consulting […]

Top 5 Cyber Threats Facing Semiconductor Manufacturing

The semiconductor industry is at the epicentre of modern innovation, yet it is also a very […]

6 wichtige Punkte für Ihren Incident Response Plan

Lesen Sie, welche Schritte für Ihren Notfallplan besonders wichtig sind. PeopleImages.com – Yuri A – Shutterstock.com […]

Hunt Evil Your Practical Guide to Threat Hunting – Part 1

You might have heard a lot of buzz around this topic of “Threat Hunting” and want […]

New Front in Cyber Espionage: Chinese Hackers and AI Agents Target Global Cloud and Telecom Infrastructure

A perfect storm is brewing in cyberspace as sophisticated Chinese state-sponsored actors escalate attacks on cloud […]

Disgruntled developer gets four-year sentence for revenge attack on employer’s network

A software developer who launched disruptive logic bombs inside his employer’s network as an act of […]

Cyberangriff auf Colt: Support-Systeme nach Lösegelddrohung offline

Der TK-Konzern Colt kämpft seit einer Woche mit den Folgen einer Ransomware-Attacke. A9 STUDIO – shutterstock.com […]

Cyberangriff auf Versicherungsmakler BüchnerBarella

Die Versicherungsbranche ist ein attraktives Ziel für Cyberkriminelle. Jetzt hat es den deutschen Versicherungsmakler BüchnerBarella getroffen. […]

Featured Chrome extension FreeVPN.One caught capturing and transmitting user data

Chrome extension, FreeVPN.One, has been found secretly capturing screenshots of users’ browsing sessions and transmitting them […]

Oracle-CSO mit überraschendem Abgang

Die CSO von Oracle, Mary Ann Davidson, verlässt das Unternehmen. Tada Images – shutterstock.com Die langjährige […]