What’s old is new again: AI is bringing XSS vulnerabilities back to the spotlight
The US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) issued […]
EDR und XDR bleiben wichtig
EDR- und XDR-Systeme bieten umfassende Sicherheit und Transparenz für alle Endpunkte und Netzwerke in Ihrer IT-Infrastruktur. […]
Hartkodierte Zugangsdaten in Solarwinds-Software
University of College | shutterstock.com Hartkodierte Zugangsdaten im Quellcode der Asset-Management- und IT-Ticketing-Software “Web Help Desk” […]
Crowdstrike wehrt sich gegen Action1-Gerüchte
Crowdstrike und Action1 würden grundsätzlich gut zusammenpassen. Nach den neuesten Kommunikationseskapaden wird das aber wohl nichts […]
Encryption backdoor debates rage across the planet, promising a difficult 2025 for CISOs
Compliance rules requiring encryption backdoors — not just for attachments, but for text; not just for […]
Cybersecurity bill could make ransomware payment reporting mandatory
The Australian Federal Government has introduced the Cyber Security Bill 2024 to Parliament proposing the country’s […]
Microsoft October update patches two zero-day vulnerabilities it says are being actively exploited
The drama of Patch Tuesday often revolves around zero days, which in October’s haul of 117 […]
The CISO’s guide to establishing quantum resilience
Pundits evangelize the benefits and challenges enterprises will face in a post-quantum era, but much still […]
APT group GoldenJackal deploys backdoors to air-gapped systems
Cyberespionage group GoldenJackal, known to target government and diplomatic entities, has updated its toolset to include […]
Deutschland ist Vizemeister bei DDoS-Angriffen
Das Angriffsvolumen der DDoS-Attacken liegt mittlerweile bei 1,7 Terabit/s. Alexander56891 – shutterstock.com Die Zahl der DDoS-Attacken auf Technologiefirmen […]