
Is HR running your employee security training? Here’s why that’s not always the best idea
In today’s fast-changing threat landscape, relying solely on human resources to deliver employee security training can […]

Lessons learned about cyber resilience from a visit to Ukraine
During a visit to the recent Kyiv International Cyber Resilience Forum 2025 in Ukraine, I encountered […]

9 unverzichtbare Open Source Security Tools
Diese Open-Source-Tools adressieren spezifische Security-Probleme – mit minimalem Footprint. Foto: N Universe | shutterstock.com Cybersicherheitsexperten verlassen […]

US bank regulator’s email system breached
A cyber intrusion at the US Office of the Comptroller of the Currency (OCC) is “massively […]

April Patch Tuesday news: Windows zero day being exploited, ‘big vulnerability’ in 2 SAP apps
A threat actor is exploiting a zero-day elevation of privileges vulnerability in the Windows Common Log […]
AI in Cybersecurity: Balancing Innovation with Governance
As cyberattacks become more sophisticated, businesses must leverage advanced technologies to stay ahead of bad actors. […]
Unlocking DPDP Act Compliance: Essential Tools You Need to Know
With the increasing digitalization of personal data and the rise of stringent data privacy regulations worldwide, […]

Ransomware-Attacke auf Europcar
Europcar hat einen Cyberangriff mit Datendiebstahl erlitten. josera – shutterstock.com Im Darknet sind kürzlich Hinweise auf […]

Chinese ToddyCat abuses ESET antivirus bug for malicious activities
China-backed APT group ToddyCat has been found exploiting a medium-severity vulnerability in ESET antivirus software to […]

Diese Unternehmen hat es schon erwischt
Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind. Roman Samborskyi | shutterstock.com Sie […]