Category: education

7 obsolete security practices that should be terminated immediately

Breaking bad habits and building better ones is a journey that requires patience, self-awareness, and determination. […]

So endet die Dienstreise nicht in Gewahrsam

Geschäftsreisen ins Ausland sind – je nach Zieldestination – zunehmend risikobehaftet. nicepix | shutterstock.com Angesichts des […]

Google Gemini vulnerability enables hidden phishing attacks

Google Gemini for Workspace can be abused to generate email summaries that appear legitimate but contain […]

7 fundamentale Cloud-Bedrohungen

Dieser Artikel hilft, Unsicherheiten in Cloud-Umgebungen vorzubeugen. Foto: Roman Samborskyi | shutterstock.com Für jedes Unternehmen, das […]

Alert: Nvidia GPUs are vulnerable to Rowhammer attacks

Nvidia has issued a security reminder to application developers, computer manufacturers, and IT leaders that modern […]

Grok 4 mit Jailbreak-Angriff geknackt

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2650257123.jpg?quality=50&strip=all 6000w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2650257123.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2650257123.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2650257123.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2650257123.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2650257123.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2650257123.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2650257123.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

How phishers are weaponizing SVG images in zero-click, evasive campaigns

Threat actors are shifting from conventional phishing tricks, which used malicious links and document macros, to […]

How defenders use the dark web

The term “dark web” may paint a picture in our head of threat actors lurking underground, […]

AI poisoning and the CISO’s crisis of trust

In May 2025, the NSA, CISA, and FBI issued a joint bulletin authored with the cooperation […]

Google Gemini-Lücke ermöglicht versteckte Phishing-Angriffe

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2400903317.jpg?quality=50&strip=all 4000w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2400903317.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2400903317.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2400903317.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2400903317.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2400903317.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2400903317.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2400903317.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

1 2 3 149