Supply chain compromise of Ultralytics AI library results in trojanized versions
Attackers have compromised Ultralytics YOLO packages published on PyPI, the official Python package index, by compromising […]

Neue EU-Gesetze zur Cyberabwehr
Die neuen Cybersicherheitsgesetze der EU konzentrieren sich darauf, Bedrohungen zu erkennen, auf Zwischenfälle zu reagieren und […]

Deutschland noch immer schlecht auf Cyberangriffe vorbereitet
srcset=”https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?quality=50&strip=all 5184w, https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

Fighting Ransomware: Using DLP Solutions to Protect Your Organization
Ransomware has evolved over the years and is now targeting organizations of all sizes with both […]

Russian hackers abuse Cloudflare tunneling service to drop GammaDrop malware
In a new campaign, a Russia-backed advanced persistent threat (APT) group is seen abusing Cloudflare tunnels […]

FCC calls for urgent cybersecurity overhaul amid Salt Typhoon espionage case
In the wake of the Salt Typhoon cyberespionage campaign allegedly linked to China, Federal Communications Commission […]

Struggling to Find Your Next Job in Cybersecurity?
Finding your next job in cybersecurity can feel like navigating a maze. If you are beginning […]

8 biggest cybersecurity threats manufacturers face
The manufacturing sector’s rapid digital transformation, complex supply chains, and reliance on third-party vendors make for […]

Sind Macs noch sicher?
MacOS galt lange als „Malware-frei“. Eine Studie legt nahe: Diese Zeiten sind längst vorbei. Zyracuze | […]

Data deletion enters the ransomware chat
Ransomware remains one of the biggest cyber threats to companies today. In a survey by security provider […]