Day: January 27, 2025

New ransomware group Funksec is quickly gaining traction

Threat reports for December showed a newcomer to the ransomware-as-a-service (RaaS) landscape quickly climbing the ranks. […]

Why You Should Hire a Virtual Data Protection Officer (vDPO) Now?

In an increasingly data-driven world, ensuring the protection of personal information has never been more crucial. […]

IT-Angriff auf das British Museum

Kurios: Ein ehemaliger Techniker hat im British Museum Systeme abgeschaltet. Mistervlad – Shutterstock.com Das weltbekannte British Museum bleibt […]

A pickle in Meta’s LLM code could allow RCE attacks

Meta’s large language model (LLM) framework, Llama, suffers a typical open-source coding oversight, potentially allowing arbitrary […]

CISOs’ top 12 cybersecurity priorities for 2025

Security chief Andrew Obadiaru’s to-do list for the upcoming year will be familiar to CISOs everywhere: […]

Cyberangriff auf Bundesdruckerei-Tochter

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?quality=50&strip=all 6235w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

Cybersecurity needs women — and it needs to treat them better

The participation of women in cybersecurity is vital, a non-negotiable proposition. Forget any current handwringing over […]

Cybersicherheitsvorschriften: So erfüllen Sie Ihre Compliance-Anforderungen

Mit der Zunahme von Cyberbedrohungen steigt auch die Zahl der Compliance-Rahmenwerke. So können CISOs diese Herausforderung […]