10 Passwordless-Optionen für Unternehmen
Um Passwörter hinter sich zu lassen, gibt es bessere Lösungen. Wir zeigen Ihnen zehn. Foto: Raffi […]
New phishing campaign tricks employees into bypassing Microsoft 365 MFA
Another device code phishing campaign that abuses OAuth device registration to bypass multifactor authentication login protections […]
US dominance of agentic AI at the heart of new NIST initiative
This week, the US National Institute of Standards and Technology (NIST) announced a new listening exercise, […]
Six flaws found hiding in OpenClaw’s plumbing
Security researchers have uncovered six high-to-critical flaws affecting the open-source AI agent framework OpenClaw, popularly known […]
Hackers can turn Grok, Copilot into covert command-and-control channels, researchers warn
Enterprise security teams racing to enable generative AI tools may be overlooking a new risk: attackers […]
Cybersicherheit braucht Reife und keine Checklisten
Wenn CISOs stärkere Programme, bessere Widerstandsfähigkeit und eine sicherere Zukunft wollen, müssen sie ihren Ansatz weiterentwickeln. […]
From in-house CISO to consultant. What you need to know before making the leap
For Nikoloz Kokhreidze, the move into cybersecurity consulting came gradually through a series of small steps. […]
Choosing and Implementing a DPDP Tech Stack: Consent, Logs, and Governance
Since the Digital Personal Data Protection (DPDP) regime in India is already shifting towards enforcement and not interpretation, […]
Notepad++ author says fixes make update mechanism ‘effectively unexploitable’
The recently compromised update mechanism for the popular open source text editor Notepad ++ has been […]
Chinese hackers exploited zero-day Dell RecoverPoint flaw for 1.5 years
For the past 18 months, a Chinese cyberespionage group has been exploiting a prevously unknown vulnerability […]