5 key trends reshaping the SIEM market
Security information and event management (SIEM) platforms have evolved far beyond their basic log collection and […]
Security-Infotainment: Die besten Hacker-Dokus
Sie fühlen sich leer ohne Security-Dashboard? Diese Dokumentationen überbrücken den Schmerz bis zum nächsten Arbeitstag. Foto: […]
Hackers turn bossware against the bosses
A threat actor is abusing an employee monitoring application and a remote monitoring and management platform […]
Why identity recovery is now central to cyber resilience
Ransomware has permanently changed how security leaders think about risk. Verizon’s 2025 Data Breach Investigations Report […]
‘Dead’ Outlook add-in hijacked to phish 4,000 Microsoft Office Store users
A blind spot in Microsoft’s app and add-in marketplace security allowed an eagle-eyed hacker to hijack […]
Neue Warn-App für Cybervorfälle gestartet
Die neue CYROS-App verknüpft Sicherheitswarnungen von Behörden und Fachquellen, um über Cybersicherheitsvorfälle zu informieren. Rawat Yapathanasap […]
Phishing campaign chains old Office flaw with fileless XWorm RAT to evade detection
Fortinet researchers have disclosed a new phishing campaign delivering the commercially available XWorm malware, chaining a […]
Palo Alto closes privileged access gap with $25B CyberArk acquisition
Cybersecurity company Palo Alto Networks has completed its $25 billion acquisition of Israel-based identity security firm […]
The ephemeral infrastructure paradox: Why short-lived systems need stronger identity governance
In my experience leading engineering projects, I have encountered the same pattern repeatedly. We obsess over […]
What CISOs need to know about the OpenClaw security nightmare
The new personal AI agent orchestration tool known as OpenClaw — formerly Clawdbot, then Moltbot — […]