Category: education

Data Principal Rights Under DPDP: How to Operationalize Requests in 15 Days

Digital Personal Data Protection (DPDP) Act has changed India’s focus of compliance to data collection to rights-based […]

Entwickler werden zum Angriffsvektor

Softwareentwickler sind gefragt – auch unter kriminellen Hackern. Gorodenkoff | shutterstock.com Statt einfach “nur” Fehler in […]

SSHStalker botnet brute-forces its way onto 7,000 Linux machines

A newly discovered botnet is compromising poorly-protected Linux servers by brute-forcing weak SSH password login authentication. […]

Companies are using ‘Summarize with AI’ to manipulate enterprise chatbots

That handy ‘Summarize with AI’ button embedded in a growing number of websites, browsers, and apps […]

North Korean actors blend ClickFix with new macOS backdoors in Crypto campaign

A financially motivated threat actor tracked as UNC1609 is using a ClickFix-style social engineering campaign to […]

EU clears Google’s $32B Wiz acquisition, intensifying cloud security competition

Google has secured unconditional EU antitrust approval for its $32 billion acquisition of cloud security firm […]

The hard part of purple teaming starts after detection

In my recent articles for CSO, I’ve talked about the limits of current SOC models and […]

CISOs must separate signal from noise as CVE volume soars

In 2026, the cybersecurity industry is expected to cross a threshold it has never reached before: […]

Vorgetäuschte PDFs bergen neue Gefahren

loading=”lazy” width=”400px”>Cyberkriminelle verschicken ihre Malware als PDF-Dateien getarnt. IDG Der Security-Anbieter Malwarebytes hat kürzlich vor einer […]

Der Kaufratgeber für Breach & Attack Simulation Tools

Breach & Attack Simulation Tools geben Aufschluss darüber, wie gut (oder schlecht) Ihre Sicherheitskontrollen funktionieren. Roman […]