Day: January 21, 2026

GitLab 2FA login protection bypass lets attackers take over accounts

A critical two-factor authentication bypass vulnerability in the Community and Enterprise editions of the GitLab application […]

Misconfigured demo environments are turning into cloud backdoors to the enterprise

Internal testing, product demonstrations, and security training are critical practices in cybersecurity, giving defenders and everyday […]

Ingram Micro admits 42,000 people impacted by ransomware attack

In July 2025, Ingram Micros suffered devastating consequences from a ransomware in which the IT distributor’s logistics […]

Oracle releases 337 security patches, including fix for critical Apache Tika flaw

Oracle has handed security teams their first big patching workload of the year, with its latest […]

EU reviews cybersecurity to limit danger from high-risk suppliers

The European Commission has presented a new cybersecurity package to strengthen the European Union’s resilience to […]

Contagious Interview turns VS Code into an attack vector

Threat actors behind the long-running Contagious Interview campaign were seen expanding from traditional social-engineering lures to […]

Hacker erbeuten rund 42.000 Datensätze von Ingram Micro

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?quality=50&strip=all 4091w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

Vulnerability prioritization beyond the CVSS number

The common vulnerability scoring system (CVSS) has long served as the industry’s default for assessing vulnerability […]

EU-Kommission will Huawei und ZTE aus Netzen verbannen

Die EU-Kommission will chinesische Hersteller wie Huawei und ZTE aus europäischen Mobilfunknetzen verbannen, um die Cybersicherheit […]

13 cyber questions to better vet IT vendors and reduce third-party risk

Increased reliance on IT service providers, digital tools, and third-party software is greatly expanding the enterprise […]