
Sixfold surge of ClickFix attacks threatens corporate defenses
Incidents of ClickFix — the social engineering attack technique that tricks users into executing malicious code […]

Auf der Suche nach Alternativen zum CVE-Programm
Sollte das CVE-Programm eingestellt werden, wäre die Bewertung und Behebung von Sicherheitslücken schwieriger. Dave Hoeek – […]

Second espionage-linked cyberattack hits ICC, exposing persistent threats to global justice systems
The International Criminal Court (ICC) has fallen victim to another sophisticated cyberattack, the second major cyber […]

Critical RCE flaw in Anthropic’s MCP inspector exposes developer machines to remote attacks
A critical remote code execution (RCE) bug in Anthropic’s Model Context Protocol (MCP) inspector tool could […]

Enhancing Endpoint Visibility Through a Unified Security Approach
It’s easy to miss critical signs when endpoint tools work in isolation. When a laptop shows […]

Securing the next wave of workload identities in the cloud
It was a moment of realization for our mid-size law team. As we were constructing a […]

Scattered Spider shifts focus to airlines as strikes hit Hawaiian, WestJet — and now Qantas
A data breach at Qantas via a third-party service is typical of the Scattered Spider attack […]

Why every company needs a travel security program
In today’s heightened geopolitical climate, business travel is no longer a routine operational necessity — it’s […]

Cyberangriff auf australische Fluggesellschaft Qantas
Die australische Fluggesellschaft Qantas ist Opfer einer Cyberattacke. Ryan Fletcher – shutterstock.com Die australische Fluggesellschaft Qantas […]

How cybersecurity leaders can defend against the spur of AI-driven NHI
Machine identities pose a big security risk for enterprises, and that risk will be magnified dramatically […]