
Lazarus Group tricks job seekers on LinkedIn with crypto-stealer
North Korea-linked Lazarus Group is duping job seekers and professionals in an ongoing campaign that runs […]

21% of CISOs pressured to not report compliance issues
CISOs are increasingly getting caught between business pressures and regulatory obligations, leaving them struggling to balance […]

The cloud is not your only option: on-prem security still alive and well in Windows Server 2025
We’ve often heard that on-premises solutions are on their way out, but until it’s clear that […]

Cyberattacken – nicht alle Manager wissen von ihrer Verantwortung
width=”6016″ height=”3384″ sizes=”(max-width: 6016px) 100vw, 6016px”>Den Kopf in den Sand zu stecken, ist beim Thema Cybersecurity […]

Download our extended detection and response (XDR) buyer’s guide
From the editors of CSO, this enterprise buyer’s guide helps IT security staff understand what XDR […]

MacOS Ferret operators add a deceptive bite to their malware family
The macOS Ferret family, variants of malware used by North Korean APTs for cyber espionage, has […]

Use payment tech and still not ready for PCI DSS 4.0? You could face stiff penalties
The Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements introduced […]

Why honeypots deserve a spot in your cybersecurity arsenal
In cybersecurity, we spend a lot of time focusing on preventative controls — patching vulnerabilities, implementing […]

New trojan hijacks Linux and IoT devices
There’s a new trojan on the block, one that specifically targets network appliances and internet of […]

AWS tightens default security on Redshift
Amazon’s security improvements for its AWS Redshift managed data warehouse service are welcome additions, says an […]