
Active Directory Incident Response: Key Things to Keep in Mind
Active Directory (AD) is crucial for network security as it controls access to sensitive data, making […]

Want to be an effective cybersecurity leader? Learn to excel at change management
If there’s one thing that’s inevitable in cybersecurity, it’s change. Ever-evolving technology requires new protections, threats […]

Unknown threat actor targeting Juniper routers with backdoor: Report
Network administrators using routers from Juniper Networks are being urged to scan for possible compromise after […]

CISA warns of critical, high-risk flaws in ICS products from four vendors
The US Cybersecurity and Infrastructure Security Agency has issued advisories for 11 critical and high-risk vulnerabilities […]

5 ways boards can improve their cybersecurity governance
As chairman of the board for Cinturion Group, Richard Marshall is intimately involved in ensuring the […]

Neue Ransomware-Gruppe Funksec profitiert von LLMs
Die neue Ransomware-Gruppe Funksec scheint bei der Entwicklung ihrer Malware durch die Nutzung von generativer KI […]

DeepSeek AI angegriffen?
Neue Benutzer können sich derzeit nicht registrieren, um DeepSeeks virales KI-Modell R1 auszutesten. Laut dem chinesischen […]

iPhone users targeted in Apple’s first zero-day exploit in 2025
Apple iPhone users were targeted for privilege escalation in the zero-day exploitation of a use-after-free vulnerability […]

DeepSeek hit by cyberattack and outage amid breakthrough success
Chinese AI startup DeepSeek said it was hit by a cyberattack, prompting the company to restrict […]

US takes aim at healthcare cybersecurity with proposed HIPAA changes
The US Department of Health and Human Services (HHS) has launched a consultation on stricter rules […]