How Can Deception Technology Fortify Industrial IoT Networks Against Cyber Threats?
Industrial IoT (IIoT) networks are under siege—from ransomware attacks that halt production lines to nation-state actors […]
CISOs beware: genAI use is outpacing security controls
Employees in every organization use an average of 6.6 high-risk generative AI applications – including some […]
Hacker erbeuten Salesforce-Daten mit Vishing
Salesforce-User in mehreren Branchen wurden Opfer einer gezielten Vishing-Attacke. JHVEPhoto – shutterstock.com Eine neue Welle von […]
Outdoor-Shop Unterwegs von Cyberattacke betroffen
Der Händler für Outdoor-Ausrüstung Unterwegs wurde gehackt. Dabei sind möglicherweise Kundendaten abgeflossen. ORIONF – shutterstock.com Der […]
Microsoft launches European Security Program to counter nation-state threats
Microsoft (Nasdaq:MSFT) has announced a comprehensive cybersecurity program that will provide free AI-powered defense tools to […]
Supply chain attack hits RubyGems to steal Telegram API data
An ongoing supply chain attack is targeting the RubyGems ecosystem to publish malicious packages intended to […]
Data hoarding can have financial and security consequences
End-of-life data management, be it deletion of what is no longer required, or data removal from […]
Hackerangriff auf deutschen Pappspezialist Wellteam
126822068 Olivier Le Moal – shutterstock.com Laut einem Bericht der Regionalzeitung Westfalen-Blatt bemerkte die IT von […]
Get out of the audit committee: Why CISOs need dedicated board time
Adequate time with the board is in short supply for CISOs and this restricted engagement is […]
Cyber Resilience in Zeiten geopolitischer Unsicherheit
Cyberbedrohungen existieren längst nicht mehr im luftleeren Raum – sie entstehen im Spannungsfeld von Geopolitik, regulatorischer […]