Microsoft-Lücke ermöglicht E-Mail-Versand ohne Authentifizierung
Drucker und Scanner werden dank einer Schwachstelle in der Microsoft 365 Direct Send-Funktion zunehmend zu Mitteln […]
The rise of the compliance super soldier: A new human-AI paradigm in GRC
As generative artificial intelligence (genAI) redefines enterprise operations, governance, risk and compliance (GRC) functions sit at […]
6 key trends redefining the XDR market
The extended detection and response (XDR) market is experiencing significant growth, driven by escalating cybersecurity threats […]
Don’t trust that email: It could be from a hacker using your printer to scam you
Printers and scanners are increasingly becoming ways for cyber crooks to deliver phishing attacks, thanks to […]
Cisco warns of critical API vulnerabilities in ISE and ISE-PIC
CSOs are being urged to quickly patch multiple vulnerabilities in Cisco Systems Identity Services Engine (ISE) […]
AMI MegaRAC authentication bypass flaw is being exploitated, CISA warns
A critical authentication bypass by spoofing vulnerability in AMI MegaRAC SPx server management firmware is now […]
US indicts one for role in BreachForums, France arrests four others
A US court indicted a man accused of being IntelBroker, a key administrator of stolen data […]
SAP-Schwachstellen gefährden Windows-Nutzerdaten
Schwachstellen in SAP GUI geben sensible Daten durch schwache oder fehlende Verschlüsselung preis. LALAKA – shutterstock.com […]
Pressure is mounting to cut jobs in favor of AI. Here’s why you shouldn’t.
Security giant CrowdStrike announced via an official SEC filing last month that it plans to cut […]
Energienetze: Neue Regeln sollen Sicherheitslücke schließen
Betreiber von Energieanlagen müssen künftig die Sicherheit ihrer kritischen IT-Komponenten prüfen lassen. Pand P Studio – […]