
The Hidden Risks of Mobile Calls and Messages: Why End-to-End Encryption is Just the Starting Line
The recent breaches of sovereign telecom networks in the United States, underscores how highly connected but […]

SAP systems increasingly targeted by cyber attackers
A review of four years of threat intelligence data, presented Friday at Black Hat by Yvan […]

PUMA creeps through Linux with a stealthy rootkit attack
A new loadable kernel module (LKM) rootkit has been spotted in the wild compromising Linux systems […]

How to turn around a toxic cybersecurity culture
A toxic cybersecurity culture affects team turnover, productivity, and morale. Worse yet, it places enterprise systems […]

Security researchers find deep flaws in CVSS vulnerability scoring system
The industrywide method for assessing the severity of vulnerabilities in software and hardware needs to be […]

Europol shutters 27 DDoS sites in major crackdown
Europol has announced that it has carried out a major crackdown on cybercriminal actors in cooperation with the […]

Microsoft Windows ‘Best Fit’ character conversion ‘ripe for exploitation’
Security researchers have outlined a novel attack vector that exploits the “Best Fit” character conversion technology […]

KeyTrap DNSSEC: The day the internet (almost) stood still
A severe vulnerability in the internet lookup protocol DNSSEC carried the potential to make much of […]

Die wichtigsten Cybersecurity-Prognosen für 2025
Der Cybersecurity-Blick auf 2025. Madcat_Madlove – Shutterstock.com Cyberangriffe auf mehrere deutsche Kliniken oder weltweite IT-Ausfälle durch […]

A security ‘hole’ in Krispy Kreme Doughnuts helped hackers take a bite
Global Doughnut and coffee chain owner Krispy Kreme, famous for its “original glazed doughnuts,” has a […]