
Palo Alto Networks zero-day firewall flaws caused by basic dev mistakes
Palo Alto Networks has issued fixes for two actively exploited vulnerabilities that impact its firewalls and […]

Cracking Threat Hunting & IR with XDR
Did you know that 68% of companies that hunt threats see their overall security improve? Cyber-attacks […]

At Ignite, Microsoft looks to genAI, exposure managment, and new bug bounties to secure enterprise IT
Microsoft announced a host of new security measures at its annual Ignite conference, with the goal […]
Aadhaar Data Vault: Enhancing Security and Privacy
The Aadhaar ecosystem is a cornerstone of India’s digital infrastructure, enabling millions of citizens to access […]

T-Mobile US von China gehackt
Erst hat die chinesische Hackergruppe Salt Typhoon Trumps Handy gehackt und jetzt T-Mobile USA. Chebakalex7/shutterstock.com Die […]

Verteidigungsminister Pistorius vermutet Sabotage
Bundesverteidigungsminister Boris Pistorius (SPD): “Niemand glaubt, dass diese Kabel aus Versehen durchtrennt worden sind.” Alexandros Michailidis […]

From MFA mandates to locked-down devices, Microsoft posts a year of SFI milestones at Ignite
During its Ignite conference on Tuesday, Microsoft shared a progress update on its Secure Future Initiative […]

Ford untersucht Hinweise auf Hackerangriff
In einem Hackerforum sind Daten aufgetaucht, die angeblich von Ford stammen. Matthew G Eddy – Shutterstock.com […]

EDR buyer’s guide: How to pick the best endpoint detection and response solution
Endpoint detection and response (EDR) explained Endpoint detection and response (EDR) security software has grown in […]