 
																		Prompt hijacking puts MCP-based AI workflows at risk
Model context protocol (MCP) gives IT teams a standardized way to connect large language models (LLMs) […]
 
																		Google ‘Careers’ scam lands job seekers in credential traps
Scammers have begun impersonating outreach from Google’s “Careers” division to trick targets into giving away their […]
 
																		‘I am not a robot’: Russian hackers use fake CAPTCHA lures to deploy espionage tools
Russian state-backed hackers are using fake “I am not a robot” CAPTCHA pages to deliver new […]
 
																		Ransomware-Attacke auf Nickelhütte Aue
Cyberkriminelle haben die Büro-IT der Nickelhütte Aue lahmgelegt. Andrey_Popov – shutterstock.com Wie die Nickelhütte Aue auf […]
 
																		4 factors creating bottlenecks for enterprise GenAI adoption
There’s a significant gap between the potential value of AI and the measurable value that enterprises […]
 
																		Salesforce’s glaring Dreamforce omission: Vital security lessons from Salesloft Drift
Salesforce’s 2025 Dreamforce conference last week offered attendees a range of sessions on best practices for […]
 
																		CAASM and EASM: Top 12 attack surface discovery and management tools
Cyber asset attack surface management (CAASM) or external attack surface management (EASM) solutions are designed to […]
 
																		Sendmarc appoints Dan Levinson as Customer Success Director in North America
Sendmarc has announced the appointment of Dan Levinson as Customer Success Director – North America, furthering […]
 
																		Diese Unternehmen hat es schon erwischt
Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind. Roman Samborskyi | shutterstock.com Sie […]
 
																		Die besten Hacker-Filme
Vorsicht, dieses Film-Listicle kann zu Prokrastination verführen! Nomad Soul | shutterstock.com Security-Profis und -Entscheider mit Hang […]
