
Russland nutzt Medienplattform für Desinformation
Die Bundesregierung macht Russland für Desinformation im Netz verantwortlich. Skorzewiak – shutterstock.com Die Bundesregierung macht Russland […]

5 multicloud security challenges — and how to address them
A multicloud environment is now standard for midsize and large organizations, with tech leaders opting to […]

North Korean crypto thieves deploy custom Mac backdoor
North Korean threat actors are targeting companies from the Web3 and crypto industries with a backdoor […]

Sixfold surge of ClickFix attacks threatens corporate defenses
Incidents of ClickFix — the social engineering attack technique that tricks users into executing malicious code […]

Auf der Suche nach Alternativen zum CVE-Programm
Sollte das CVE-Programm eingestellt werden, wäre die Bewertung und Behebung von Sicherheitslücken schwieriger. Dave Hoeek – […]

Second espionage-linked cyberattack hits ICC, exposing persistent threats to global justice systems
The International Criminal Court (ICC) has fallen victim to another sophisticated cyberattack, the second major cyber […]

Critical RCE flaw in Anthropic’s MCP inspector exposes developer machines to remote attacks
A critical remote code execution (RCE) bug in Anthropic’s Model Context Protocol (MCP) inspector tool could […]

Enhancing Endpoint Visibility Through a Unified Security Approach
It’s easy to miss critical signs when endpoint tools work in isolation. When a laptop shows […]

Securing the next wave of workload identities in the cloud
It was a moment of realization for our mid-size law team. As we were constructing a […]

Scattered Spider shifts focus to airlines as strikes hit Hawaiian, WestJet — and now Qantas
A data breach at Qantas via a third-party service is typical of the Scattered Spider attack […]