
More telecom firms were breached by Chinese hackers than previously reported
Chinese hackers linked to the Salt Typhoon cyberespionage operation have breached even more US telecommunications firms […]

Open source vulnerability scanner found with a serious vulnerability in its own code
A widely popular open-source tool, Nuclei, used for scanning vulnerabilities and weaknesses in websites, cloud applications, […]

Personal liability sours 70% of CISOs on their role
With legal accountability tightening around those charged with maintaining enterprise cybersecurity, security leaders appear to be […]

12 cybersecurity resolutions for 2025
As cyber threats continue to evolve, CISOs must prepare for an increasingly complex threat landscape. From […]

7 fundamentale Cloud-Bedrohungen
Dieser Artikel hilft, Unsicherheiten in Cloud-Umgebungen vorzubeugen. Foto: Roman Samborskyi | shutterstock.com Für jedes Unternehmen, das […]