Don't let mistakes bother you

If you don't care, you may become a victim of spam

Trust becomes an attack vector in the new campaign using trojanized KeePass

A known crew of cybercriminals has weaponized the widely used, open-source KeePass password manager with malware […]

GitHub package limit put law firm in security bind

A $1 billion law firm last week learned a critical cybersecurity lesson: Even something as innocuous […]

Threat intelligence platform buyer’s guide: Top vendors, selection advice

The bedrock of a solid enterprise security program begins with the choice of an appropriate threat […]

Software Bill of Material umsetzen: Die besten SBOM-Tools

Nur wenn Sie wissen, was drinsteckt, können Sie sich sicher sein, dass alles mit rechten Dingen […]

Poor DNS hygiene is leading to domain hijacking

Threat actors continue to find ways of hijacking domains thanks to poor DNS record-keeping and misconfigurations […]

A Guide to Perimeter Defense in Modern Networks

Organizations can’t run without digital systems and connected technologies in today’s fast-moving world. This digital adoption […]

8 KI-Sicherheitsrisiken, die Unternehmen übersehen

In ihrem Wettlauf um Produktivitätssteigerungen durch generative KI übersehen die meisten Unternehmen die damit verbundenen Sicherheitsrisiken. […]

You’ve already been targeted: Why patch management is mission-critical

Security is evolving because attackers already have. The rise in threats facing IT teams today is […]

Skitnet malware: The new ransomware favorite

Ransomware operators are now actively using a modular malware, Skitnet, sold on underground forums including RAMP […]

4 ways to safeguard CISO communications from legal liabilities

In 2019, Russian threat actors began targeting Texas-based business software provider SolarWinds. What started as a […]

1 28 29 30 31 32 180