
Oracle Cloud breach may impact 140,000 enterprise customers
A threat actor has reportedly breached Oracle Cloud infrastructure, exfiltrating six million sensitive authentication records and […]

KI als Turbo für Kriminelle
width=”2500″ height=”1406″ sizes=”(max-width: 2500px) 100vw, 2500px”>Europol warnt: Kriminelle nutzen KI, um ihre Operationen zu automatisieren und […]

New phishing campaign uses scareware to steal Apple credentials
A new phishing campaign targeting Mac systems employs scareware tactics to steal Apple IDs and passwords […]

Trump shifts cyberattack readiness to state and local governments in wake of info-sharing cuts
On March 19, the White House issued the first executive order (EO) to directly address cybersecurity […]

CISOs are taking on ever more responsibilities and functional roles – has it gone too far?
When George Gerchow was CISO at Sumo Logic, his responsibilities incorporated the kind of work typically […]

Kubernetes Security: Wie Sie Ihre Cluster (besser) absichern
Anatoliy Eremin | shutterstock.com Kubernetes hat sich unter Enterprise-Softwareentwicklern zu einem durchschlagenden Erfolg entwickelt. Das veranlasst […]