Open-source DFIR Velociraptor was abused in expanding ransomware efforts
Velociraptor, the open-source DFIR tool meant to hunt intruders, has itself gone rogue – being picked […]
it-sa-Special
Salesforce rekrutiert Security- und Privacy-Agenten Salesforce erweitert seine KI-Plattform für den Einsatz im Bereich Security und […]
The CIA triad is dead — stop using a Cold War relic to fight 21st century threats
For decades, the information security industry has been stuck in a time warp. We face threats […]
Sammelklage gegen Facebook-Mutter Meta
Im April 2021 wurden Daten von mehr als 530 Millionen Facebook-Nutzern gestohlen. Das hat Folgen für […]
Disaster Recovery und Business Continuity effektiv planen
Sechs Schritte sollten CISOs für einen erfolgreichen Disaster-Recovery- und Business-Continuity-Plan beachten. DC Studio / Shutterstock Die […]
LockBit, DragonForce, and Qilin form a ‘cartel’ to dictate ransomware market conditions
Three of the most notorious ransomware-as-a-service operations have formed a criminal cartel aimed at coordinating attacks […]
Lücke in Hotelsoftware legt Kundendaten offen
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?quality=50&strip=all 5472w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1213189189.jpg?resize=150%2C84&quality=50&strip=all 150w, […]
ClayRat spyware turns phones into distribution hubs via SMS and Telegram
A fast-evolving Android spyware campaign known as “ClayRat,” initially targeting Russian users but now spreading far […]
Homeland Security’s reassignment of CISA staff leaves US networks exposed
The US Department of Homeland Security has started reassigning cybersecurity personnel to non-cyber duties tied to […]
Your cyber risk problem isn’t tech — it’s architecture
The creation of an ongoing cyber risk management process, aligned with the governance of the information […]