Budgetprobleme bremsen Cybersicherheit aus
Die meisten Unternehmen im DACH-Raum kämpfen mit Budgetproblemen, wenn es um das Thema Cybersicherheit geht. Gravica […]
Evolved PXA Stealer wraps PureRAT in multi-layer obfuscation
Security researchers have uncovered a Vietnamese threat group evolving from their custom PXA Stealer campaign into […]
Vulnerability in Salesforce AI could be tricked into leaking CRM data
A newly disclosed critical vulnerability in Salesforce’s Agentforce platform could trick the AI agent into leaking […]
AI coding assistants amplify deeper cybersecurity risks
The productivity improvements that arise from increasing use of AI coding tools are coming at the […]
Government’s Push for Data Privacy in 2025
Privacy of data is not a compliance option anymore, it is a national priority. Governments around […]
Die besten Cyber-Recovery-Lösungen
Nicht greifende Recovery-Prozesse sind für Unternehmen ein Albtraumszenario, das dank ausgefeilter Angriffe immer öfter zur Realität […]
Chinese spies had year-long access to US tech and legal firms
Chinese threat actors deployed a custom Linux backdoor on compromised network edge devices to maintain persistent […]
Macs go phishing as GitHub impostors drop Atomic stealer
In an active, large-scale campaign, attackers are posing as legitimate brands on GitHub Pages to target […]
What I learned extending zero trust to the storage layer
When I first started thinking seriously about applying zero trust principles to the storage layer, it […]
Nach Cyberangriff: IT-Störung in Hoppegarten dauert an
Der Cyberangriff auf die Gemeinde Hoppegarten im August sorgt aktuell noch immer für IT-Probleme. Vectors Bang […]