
April Patch Tuesday news: Windows zero day being exploited, ‘big vulnerability’ in 2 SAP apps
A threat actor is exploiting a zero-day elevation of privileges vulnerability in the Windows Common Log […]
AI in Cybersecurity: Balancing Innovation with Governance
As cyberattacks become more sophisticated, businesses must leverage advanced technologies to stay ahead of bad actors. […]
Risk-Based Vulnerability Management in IT: Reducing Exploitability Through Automated Prioritization
Organizations face a monumental challenge managing cyber risk and vulnerabilities across expanding digital environments. Research indicates […]
Unlocking DPDP Act Compliance: Essential Tools You Need to Know
With the increasing digitalization of personal data and the rise of stringent data privacy regulations worldwide, […]

Ransomware-Attacke auf Europcar
Europcar hat einen Cyberangriff mit Datendiebstahl erlitten. josera – shutterstock.com Im Darknet sind kürzlich Hinweise auf […]

Chinese ToddyCat abuses ESET antivirus bug for malicious activities
China-backed APT group ToddyCat has been found exploiting a medium-severity vulnerability in ESET antivirus software to […]

Diese Unternehmen hat es schon erwischt
Lesen Sie, welche Unternehmen in Deutschland aktuell von Cyberangriffen betroffen sind. Roman Samborskyi | shutterstock.com Sie […]

Why DEI is key for a cyber safe future
Now more than ever, cybersecurity is a national security and international security imperative. As the US […]

10 things you should include in your AI policy
The popularity of generative AI has created a tricky terrain for organizations to navigate. On the […]

External Attack Surface Management (EASM): Mit diesen vier Schritten minimieren Sie das Cyberrisiko
IT-Security-Verantwortliche sollten die Angriffsfläche permanent analysieren und schützen. Dazu müssen sie stets im Blick haben, welche […]