
Die besten IAM-Tools
Identity & Access Management ist für sicherheitsbewusste Unternehmen im Zero-Trust-Zeitalter Pflicht. Das sind die besten IAM-Anbieter […]

PostgreSQL patches SQLi vulnerability likely exploited in BeyondTrust attacks
Attackers who exploited a zero-day vulnerability in BeyondTrust Privileged Remote Access and Remote Support products in […]

DLP solutions vs today’s cyberthreats: The urgent need for modern solutions
Today’s hybrid network environments are more complex than ever. With workforces and offices now widely distributed, […]

Unusual attack linked to Chinese APT group combines espionage and ransomware
In an intriguing development, researchers have observed a ransomware actor using tools previously associated with China-based […]

Händler sichern SB-Kassen mit Künstlicher Intelligenz
Experten sehen ein steigendes Diebstahlrisiko für den Einzelhandel durch den Einsatz von SB-Kassen. adriaticfoto – shutterstock.com […]

Russian hacking group targets critical infrastructure in the US, the UK, and Canada
A Russian state-backed hacking group is executing one of the most far-reaching cyber espionage campaigns ever […]

CISA, FBI call software with buffer overflow issues ‘unforgivable’
FBI and CISA have issued a joint advisory to warn software developers against building codes with […]

24% of vulnerabilities are abused before a patch is available
Almost one in four (24%) known exploited vulnerabilities discovered last year were abused on or before […]

What security teams need to know about the coming demise of old Microsoft servers
October 2025 is going to be a big month for saying goodbye to several aging Microsoft […]

CISOs lavieren zwischen Datenschutz und Business-Support
loading=”lazy” width=”400px”>Gar nicht so einfach, die richtige Balance zwischen Datenschutz und Business-Support zu finden. alphaspirit.it – […]