Ivanti patches two actively exploited critical vulnerabilities in EPMM
IT software company Ivanti released patches for its Endpoint Manager Mobile (EPMM) product to fix two […]
Startup Amutable plotting Linux security overhaul to counter hacking threats
If there’s one thing guaranteed to grab attention in the computer security world, it’s announcing yourself […]
NIS2: Lieferketten als Risikofaktor
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?quality=50&strip=all 2500w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=150%2C84&quality=50&strip=all 150w, […]
Hugging Face infra abused to spread Android RAT in a large-scale malware campaign
An Android malware campaign is reportedly abusing Hugging Face’s public hosting infrastructure to distribute a remote […]
The CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we […]
Human risk management: CISOs’ solution to the security awareness training paradox
Cybersecurity guru Bruce Scheier is often quoted as saying, “People are the weakest link in the […]
OT & IoT Security in MEA: Why Industrial Cyber Risks Are Surging
The Middle East and Africa (MEA) region is experiencing a rapid industrial change. The use of […]
Roughly half of employees are using unsanctioned AI tools, and enterprise leaders are major culprits
Shadow AI, the secret, unapproved use of AI by employees, isn’t going away. In fact, workers […]