
Implementing zero trust in AI and LLM architectures: A practitioner’s guide to secure and responsible AI systems
In the rapidly evolving landscape of artificial intelligence (AI) and large language models (LLMs), security can […]

US says China conducted massive espionage through breached telcos
Multiple US telecommunications companies were hacked into by a People’s Republic of China (PRC)-backed threat actor […]

How to defend Microsoft networks from adversary-in-the-middle attacks
An office worker received an email that appeared to be from a vendor but was caught […]

Citrix admins advised to install hotfixes to block vulnerabilities
CISOs with Citrix Virtual Apps and Desktop in their environments should patch two holes that could […]

NIST publishes timeline for quantum-resistant cryptography, but enterprises must move faster
The US National Institute of Standards and Technology (NIST) on Tuesday published its timetables for moving […]

November 2024 Patch Tuesday patches four zero days and three critical flaws
After hitting users with five zero-day vulnerabilities in October, November’s Patch Tuesday update has followed up […]

Amazon bestätigt Datenklau
Amazon ist von einem Datenleck betroffen. Hintergrund ist eine Sicherheitslücke bei einem Drittanbieter. bluestork – Shutterstock.com […]

Volt Typhoon returns with fresh botnet attacks on critical US infrastructure
Volt Typhoon, a China-linked cyber-espionage group, has renewed its assault on US infrastructure through an advanced […]

BSI-Lagebericht: Hacker werden immer professioneller und aggressiver
Das Böse ist immer und überall, sang schon die EAV – das gilt insbesondere auch für […]

The CISO paradox: With great responsibility comes little or no power
The title of chief information security officer suggests that the position would come with a level […]