
Authorities seize Phobos and 8Base ransomware servers, arrest 4 suspects
Law enforcement agencies from 14 countries collaborated in an investigation against the related Phobos and 8Base […]

How to communicate clearly (and legally) during a cybersecurity crisis
What do a CISO handling a data breach and a 10-year-old who just accidentally broke his […]

Hacker bringen falsche Rechnungen in Umlauf
Hacker haben eine Handelsfirma in Mecklenburg-Vorpommern angegriffen und in deren Namen Rechnungen verschickt. PeopleImages.com – Yuri […]

World Economic Forum Annual Meeting 2025: Takeaways, reflections, and learnings for the future
In January, leaders from around the world gathered at the 55th Annual World Economic Forum (WEF) […]

CSO Award and Hall of Fame Nominations Open Now
Has your organization pioneered groundbreaking security initiatives that delivered real business value? If so, now is […]

Over 12,000 KerioControl firewalls remain prone to RCE attacks amid active exploits
Businesses around the globe have over 12,000 vulnerable instances of the GFI KerioControl application — a […]

Why security leaders must ensure they have a recovery plan for Active Directory attacks
With mass digitisation and the rising prevalence of global, highly distributed enterprise, cybersecurity leaders must ensure […]

Apple issues emergency patches to contain an ‘extremely sophisticated attack’ on targeted individuals
Apple has rolled out emergency security patches after discovering that an “extremely sophisticated attack” exploited a […]

WTF? Why the cybersecurity sector is overrun with acronyms
Back when Elon Musk was best known for founding SpaceX and Tesla, not as one of […]

Top 5 ways attackers use generative AI to exploit your systems
Artificial intelligence is revolutionizing the technology industry and this is equally true for the cybercrime ecosystem, […]