Badbox Android botnet disrupted through coordinated threat hunting
Badbox, the notorious Android malware botnet, has been disrupted for a third time in 15 months, […]
Access Management Systems sind offene Türen für Hacker
Wenn Hacker biometrische Zugangsdaten erbeuten, können Sie erhebliche Schäden anrichten. shuttertsock – itj aks zoone Fehler […]
60% of cybersecurity pros looking to change employers
Cybersecurity worker job satisfaction is mediocre with many staff actively considering a change. Only a third […]
The risks of standing down: Why halting US cyber ops against Russia erodes deterrence
The recent order directing US Cyber Command to halt all planning of offensive cyber operations against […]
Ransomware goes postal: US healthcare firms receive fake extortion letters
In late February, healthcare organizations across the US started receiving extortion demands by mail claiming that […]
Polnische Raumfahrtbehörde kämpft mit Cyberattacke
Die polnische Raumfahrtbehörde POLSA wurde Ziel eines Cyberangriffs. BUTENKOV ALEKSEI – Shutterstock.com Wie die polnische Raumfahrtbehörde […]
So werden PV-Anlagen digital angegriffen und geschützt
Unternehmen setzen vermehrt auf Solaranlagen mit Batteriespeichern, um hohe Energiekosten und Netzstabilitätsrisiken zu minimieren. Diese Systeme […]
Critical vulnerabilities expose network security risks in Keysight’s infrastructure
Keysight Technologies’ Ixia Vision product family has been found to contain critical security vulnerabilities that could […]
The dirty dozen: 12 worst ransomware groups active today
Ransomware-as-a-service (RaaS) models, double extortion tactics, and increasing adoption of AI characterize the evolving ransomware threat […]
Chinese cyber espionage growing across all industry sectors
Security researchers are warning of a significant global rise in Chinese cyberespionage activity against organizations in […]