
CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in minutes
CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to […]

Russian hackers turn trusted online stores into phishing pages
In a smart campaign, Russian cybercriminals are turning trusted online stores into phishing pages that capture […]

Chinesische Hacker attackieren US-Finanzministerium
Die IT-Security im US-Finanzministerium dürfte angesichts des chinesischen Hackerangriffs wenig erholsame Weihnachtsferien gehabt haben. Mark Gomez […]

Gen AI is transforming the cyber threat landscape by democratizing vulnerability hunting
Generative AI has had a significant impact on a wide variety of business processes, optimizing and […]

US military allocated about $30 billion to spend on cybersecurity in 2025
The United States military will receive about $30 billion in cybersecurity funding in fiscal 2025 from […]

More telecom firms were breached by Chinese hackers than previously reported
Chinese hackers linked to the Salt Typhoon cyberespionage operation have breached even more US telecommunications firms […]

Open source vulnerability scanner found with a serious vulnerability in its own code
A widely popular open-source tool, Nuclei, used for scanning vulnerabilities and weaknesses in websites, cloud applications, […]

Personal liability sours 70% of CISOs on their role
With legal accountability tightening around those charged with maintaining enterprise cybersecurity, security leaders appear to be […]

12 cybersecurity resolutions for 2025
As cyber threats continue to evolve, CISOs must prepare for an increasingly complex threat landscape. From […]

7 fundamentale Cloud-Bedrohungen
Dieser Artikel hilft, Unsicherheiten in Cloud-Umgebungen vorzubeugen. Foto: Roman Samborskyi | shutterstock.com Für jedes Unternehmen, das […]