Der Kaufratgeber für Breach & Attack Simulation Tools
Breach & Attack Simulation Tools geben Aufschluss darüber, wie gut (oder schlecht) Ihre Sicherheitskontrollen funktionieren. Roman […]
February 2026 Patch Tuesday: Six new and actively exploited Microsoft vulnerabilities addressed
Microsoft highlighted six new and actively exploited vulnerabilities among the 60 fixes issued in today’s February […]
BeyondTrust fixes critical RCE flaw in remote access tools
Companies using self-hosted versions of BeyondTrust Remote Support (RS) or Privileged Remote Access (PRA) should deploy […]
SolarWinds WHD zero-days from January are under attack
SolarWinds Web Help Desk (WHD) is under attack, with recent incidents exploiting a chain of zero-day […]
Cyberangriff auf EU-Kommission
Cyberkriminellen ist es gelungen, in ein System der EU-Kommission einzudringen. Elza Low – shutterstockcom Die Europäische […]
Windows shortcut weaponized in Phorpiex-linked ransomware campaign
Forcepoint X-Labs researchers have identified a large Phorpiex botnet-aided phishing campaign that uses weaponized Windows shortcut […]
Single prompt breaks AI safety in 15 major language models
A single benign-sounding prompt can systematically strip safety guardrails from major language and image models, raising […]
How to govern agentic AI so as not to lose control
This year will mark the turning point where artificial intelligence will stop assisting and start acting. […]
69% of CISOs open to career move — including leaving role entirely
Enterprise CISOs are increasingly willing — and eager — to jump ship, with some frustrated enough to […]
Designing DPDP Compliant Consent and Notice Flows
The Digital Personal Data Protection (DPDP) Act in India transforms the privacy compliance documentation of companies […]