Day: January 30, 2026

Ivanti patches two actively exploited critical vulnerabilities in EPMM

IT software company Ivanti released patches for its Endpoint Manager Mobile (EPMM) product to fix two […]

Startup Amutable plotting Linux security overhaul to counter hacking threats

If there’s one thing guaranteed to grab attention in the computer security world, it’s announcing yourself […]

NIS2: Lieferketten als Risikofaktor

srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?quality=50&strip=all 2500w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2667391403.png?resize=150%2C84&quality=50&strip=all 150w, […]

Hugging Face infra abused to spread Android RAT in a large-scale malware campaign

An Android malware campaign is reportedly abusing Hugging Face’s public hosting infrastructure to distribute a remote […]

The CSO guide to top security conferences

There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we […]

Human risk management: CISOs’ solution to the security awareness training paradox

Cybersecurity guru Bruce Scheier is often quoted as saying, “People are the weakest link in the […]

OT & IoT Security in MEA: Why Industrial Cyber Risks Are Surging

The Middle East and Africa (MEA) region is experiencing a rapid industrial change. The use of […]

Roughly half of employees are using unsanctioned AI tools, and enterprise leaders are major culprits

Shadow AI, the secret, unapproved use of AI by employees, isn’t going away. In fact, workers […]