
Hotel chain ditches Google search for DuckDuckGo — ‘subjected to fraud attempts daily’
At the end of 2021, Nordic Choice Hotels, now renamed Strawberry, was hit by a major […]

US attacks ransomware supply chain with indictment of three cryptocurrency mixer operators
The US Department of Justice indicted three Russian citizens on Friday for allegedly running services that […]

Sicherheitsmängel gefährden DNA-Sequenziergeräte
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?quality=50&strip=all 5283w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_1941013627.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

Biden’s final push: Using AI to bolster cybersecurity standards
In a decisive move to strengthen national cybersecurity, President Joe Biden is poised to sign an […]

CISOs embrace rise in prominence — with broader business authority
It’s a familiar refrain: As cybersecurity has become a core business priority, it is no longer […]

Phishing click rates tripled in 2024 despite user training
For years organizations have invested in security awareness training programs to teach employees how to spot […]

Payback-CISO: „Vorbereitung ist das A und O“
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?quality=50&strip=all 6016w, https://b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

Was ist Social Engineering?
Mit Social-Engineering-Techniken manipulieren Cyberkriminelle die menschliche Psyche. Lesen Sie, wie das funktioniert und wie Sie sich […]

2025 Cybersecurity and AI Predictions
The cybersecurity and AI landscape continues to evolve at a breathtaking pace, and with it, the […]
The Hidden Hero of Payment Security: Why You Need a Payment HSM
In today’s fast-paced digital world, online transactions are the norm, and with that comes a huge […]