ShinyHunters ramp up new vishing campaign with 100s in crosshairs
Notorious extortion group ShinyHunters released tens of GB of files it claims to have stolen from […]
Identitäten im Fokus von Cyberkriminellen
Cyberkriminelle haben es inzwischen vermehrt auf digitale Identitäten abgesehen. khunkornStudio – shutterstock.com Der State of Incident […]
Critical RCE bugs expose the n8n automation platform to host‑level compromise
Two critical sandbox escape flaws in the popular n8n workflow automation platform are allowing authenticated users […]
CISA chief uploaded sensitive government files to public ChatGPT
The acting director of the US Cybersecurity and Infrastructure Security Agency uploaded sensitive government contracting documents […]
EU’s answer to CVE solves dependency issue, adds fragmentation risks
The security community has offered broad support for the creation of an EU-hosted vulnerability database as […]
Reports of GDPR violations have risen sharply
According to a recent report by law firm DLA Piper, organizations are increasingly being reported for violations of […]
Kritik am Kritis-Dachgesetz: “Flickenteppich” befürchtet
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?quality=50&strip=all 2500w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2678609805.png?resize=150%2C84&quality=50&strip=all 150w, […]
NIST’s AI guidance pushes cybersecurity boundaries
For years, US cybersecurity guidance rested on a reassuring premise: New technologies introduce new wrinkles, but […]
Designing an End-to-End Data Protection Architecture
In a period characterized by the acceleration of digital faster, more regulatory bodies and constant cyber […]
10 Anzeichen für einen schlechten CSO
Sind IT-Mitarbeiter unzufrieden, kann das an schlechten Führungskräften oder an einer unzureichenden IT-Strategie liegen. Foto: fizkes […]