Day: February 4, 2026

AWS ECR Scanning: The Practical Guide to Securing Your Containers

If you operate containers on AWS you’re likely familiar with how vulnerabilities can accumulate. The majority of container images currently include least one critical security […]

12 ~/.bashrc Hacks Hackers Can’t Live Without

Introduction Hook: Your terminal is your home. Why live in a shack when you can build […]

Russian hackers exploited a critical Office bug within days of disclosure

Russia-linked attackers are reportedly using a new Microsoft vulnerability as part of a coordinated espionage and […]

Hackerangriff auf Romina Mineralbrunnen

srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?resize=854%2C480&quality=50&strip=all 854w, […]

Zero trust in practice: A deep technical dive into going fully passwordless in hybrid enterprise environments

Over the past three years, I’ve led passwordless migration initiatives at three Fortune 500 companies, and […]

Cybercriminals set sites on identities

Eye Security’s 2026 State of Incident Response Report shows that cyberattacks on companies are increasingly going undetected, […]

Should I stay or should I go?

Even the most seasoned CISOs sometimes run into insurmountable roadblocks at their organizations. Despite their best […]

Die besten DAST- & SAST-Tools

Tools für Dynamic und Static Application Security Testing helfen Entwicklern, ihren Quellcode zu härten. Wir zeigen […]