
Cyberattacken – nicht alle Manager wissen von ihrer Verantwortung
width=”6016″ height=”3384″ sizes=”(max-width: 6016px) 100vw, 6016px”>Den Kopf in den Sand zu stecken, ist beim Thema Cybersecurity […]

Download our extended detection and response (XDR) buyer’s guide
From the editors of CSO, this enterprise buyer’s guide helps IT security staff understand what XDR […]

MacOS Ferret operators add a deceptive bite to their malware family
The macOS Ferret family, variants of malware used by North Korean APTs for cyber espionage, has […]

Why honeypots deserve a spot in your cybersecurity arsenal
In cybersecurity, we spend a lot of time focusing on preventative controls — patching vulnerabilities, implementing […]

Use payment tech and still not ready for PCI DSS 4.0? You could face stiff penalties
The Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements introduced […]

New trojan hijacks Linux and IoT devices
There’s a new trojan on the block, one that specifically targets network appliances and internet of […]

AWS tightens default security on Redshift
Amazon’s security improvements for its AWS Redshift managed data warehouse service are welcome additions, says an […]

Abandoned AWS S3 buckets open door to remote code execution, supply-chain compromises
Code references to nonexistent cloud assets continue to pose significant security risks, and the problem is […]