
Ethical hackers exploited zero-day vulnerabilities against popular OS, browsers, VMs and AI frameworks
Security researchers showcased 28 zero-day vulnerabilities during the Pwn2Own contest held during the OffensiveCon conference in […]

Massives Datenleck in Cloud-Speichern
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2560922485.jpg?quality=50&strip=all 5771w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2560922485.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2560922485.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2560922485.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2560922485.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2560922485.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2560922485.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2560922485.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

A spoof antivirus makes Windows Defender disable security scans
Windows Defender can be tricked into disabling itself by faking the presence of another antivirus solution–a […]

8 security risks overlooked in the rush to implement AI
In their race to achieve productivity gains from generative AI, most organizations overlook the security implications […]

Passwortfreie Authentifizierung: So gelingt der Umstieg auf PKI
Die zertifikatsbasierte Authentifizierung mit PKI erfolgt via physischen Token statt Passwort. Momentum studio – shutterstock.com Die […]

‘Would rather pay bounty than ransom’: Coinbase on $20M extortion attempt
Coinbase (Nasdaq:COIN), the largest crypto exchange in the US, is offering a $20 million bounty for […]

How to establish an effective AI GRC framework
Enterprise use of artificial intelligence comes with a wide range of risks in areas such as […]

Hacker stehlen BVG-Kundendaten
Kunden der Berliner Verkehrsbetriebe (BVG) sind von einer Datenpanne betroffen. Media centre BVG Die Berliner Verkehrsbetriebe […]

Proofpoint buying Hornetsecurity in a play to expand email security scope
More than of 90% of successful cyberattacks begin with emails, according to the US Cybersecurity and […]

After helping Russia on the ground North Korea targets Ukraine with cyberespionage
North Korea’s involvement in the war in Ukraine extends beyond sending soldiers, munitions, and missiles to […]