
Authorities seize Phobos and 8Base ransomware servers, arrest 4 suspects
Law enforcement agencies from 14 countries collaborated in an investigation against the related Phobos and 8Base […]

How to communicate clearly (and legally) during a cybersecurity crisis
What do a CISO handling a data breach and a 10-year-old who just accidentally broke his […]
How is Deep Session Inspection a Game Changer for Threat Detection?
Deep Session Inspection (DSI) is like having a security guard who watches the entire conversation between […]

Hacker bringen falsche Rechnungen in Umlauf
Hacker haben eine Handelsfirma in Mecklenburg-Vorpommern angegriffen und in deren Namen Rechnungen verschickt. PeopleImages.com – Yuri […]

Addressing Cloud Security Blind Spots for Better Protection
As businesses increasingly migrate to the cloud, securing these dynamic environments has become more challenging than […]

World Economic Forum Annual Meeting 2025: Takeaways, reflections, and learnings for the future
In January, leaders from around the world gathered at the 55th Annual World Economic Forum (WEF) […]

CSO Award and Hall of Fame Nominations Open Now
Has your organization pioneered groundbreaking security initiatives that delivered real business value? If so, now is […]

Over 12,000 KerioControl firewalls remain prone to RCE attacks amid active exploits
Businesses around the globe have over 12,000 vulnerable instances of the GFI KerioControl application — a […]
Basic Network Concepts for Hacking
If you’re stepping into the world of ethical hacking, then network knowledge isn’t just helpful but […]
Basic Network Concepts for Hacking
If you’re stepping into the world of ethical hacking, then network knowledge isn’t just helpful but […]