
Don’t use public ASP.NET keys (duh), Microsoft warns
Microsoft Threat Intelligence in December observed a “threat actor” using a publicly available ASP.NET machine key […]

Ermittler zerschlagen Ransomware-Gruppierung 8Base
Die Gruppierung 8Base nutzte die Ransomware „Phobos“ und agierte weltweit als höchst professionelle kriminelle Organisation. In […]

Hacker allegedly puts massive OmniGPT breach data for sale on the dark web
Popular AI aggregator OmniGPT, which provides access to multiple AI models including ChatGPT-4, Claude 3.5, Gemini, […]

DeepSeek erfasst Tastatureingabemuster
Selbst Tastatureingaben in der DeepSeek App können womöglich mitgelesen werden, bevor sie abgeschickt werden. Mojahid Mottakin […]

Jeder fünfte CISO vertuscht Compliance-Probleme
Compliance-Verfehlungen unter den Teppich zu kehren, sollte sich für CISOs falsch anfühlen. Roman Samborskyi | shutterstock.com […]

Beyond the paycheck: What cybersecurity professionals really want
The cybersecurity industry is facing an unprecedented challenge: retaining skilled professionals in the midst of an […]

UK monitoring group to classify cyber incidents on earthquake-like scale
A UK body backed by the cyber insurance industry is seeking to establish a framework to […]

February Patch Tuesday: CISOs should act now on two actively exploited Windows Server vulnerabilities
CISOs should make sure that two actively exploited vulnerabilities in Windows are addressed as part of […]

Authorities seize Phobos and 8Base ransomware servers, arrest 4 suspects
Law enforcement agencies from 14 countries collaborated in an investigation against the related Phobos and 8Base […]

How to communicate clearly (and legally) during a cybersecurity crisis
What do a CISO handling a data breach and a 10-year-old who just accidentally broke his […]