Day: February 5, 2025

Cyberattacken – nicht alle Manager wissen von ihrer Verantwortung

width=”6016″ height=”3384″ sizes=”(max-width: 6016px) 100vw, 6016px”>Den Kopf in den Sand zu stecken, ist beim Thema Cybersecurity […]

Download our extended detection and response (XDR) buyer’s guide

From the editors of CSO, this enterprise buyer’s guide helps IT security staff understand what XDR […]

MacOS Ferret operators add a deceptive bite to their malware family

The macOS Ferret family, variants of malware used by North Korean APTs for cyber espionage, has […]

Why honeypots deserve a spot in your cybersecurity arsenal

In cybersecurity, we spend a lot of time focusing on preventative controls — patching vulnerabilities, implementing […]

Use payment tech and still not ready for PCI DSS 4.0? You could face stiff penalties

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements introduced […]

New trojan hijacks Linux and IoT devices

There’s a new trojan on the block, one that specifically targets network appliances and internet of […]

AWS tightens default security on Redshift

Amazon’s security improvements for its AWS Redshift managed data warehouse service are welcome additions, says an […]

Abandoned AWS S3 buckets open door to remote code execution, supply-chain compromises

Code references to nonexistent cloud assets continue to pose significant security risks, and the problem is […]