
Trust becomes an attack vector in the new campaign using trojanized KeePass
A known crew of cybercriminals has weaponized the widely used, open-source KeePass password manager with malware […]

GitHub package limit put law firm in security bind
A $1 billion law firm last week learned a critical cybersecurity lesson: Even something as innocuous […]

Threat intelligence platform buyer’s guide: Top vendors, selection advice
The bedrock of a solid enterprise security program begins with the choice of an appropriate threat […]

Software Bill of Material umsetzen: Die besten SBOM-Tools
Nur wenn Sie wissen, was drinsteckt, können Sie sich sicher sein, dass alles mit rechten Dingen […]

Poor DNS hygiene is leading to domain hijacking
Threat actors continue to find ways of hijacking domains thanks to poor DNS record-keeping and misconfigurations […]
A Guide to Perimeter Defense in Modern Networks
Organizations can’t run without digital systems and connected technologies in today’s fast-moving world. This digital adoption […]

8 KI-Sicherheitsrisiken, die Unternehmen übersehen
In ihrem Wettlauf um Produktivitätssteigerungen durch generative KI übersehen die meisten Unternehmen die damit verbundenen Sicherheitsrisiken. […]

You’ve already been targeted: Why patch management is mission-critical
Security is evolving because attackers already have. The rise in threats facing IT teams today is […]

Skitnet malware: The new ransomware favorite
Ransomware operators are now actively using a modular malware, Skitnet, sold on underground forums including RAMP […]

4 ways to safeguard CISO communications from legal liabilities
In 2019, Russian threat actors began targeting Texas-based business software provider SolarWinds. What started as a […]