
The most notorious and damaging ransomware of all time
Ransomware has a long history, dating back to the late 1980s. This past year, it generated $811 […]

CIOs and CISOs take on NIS2: Key challenges, security opportunities
The impact of NIS2 compliance on day-to-day operations has put many IT leaders in a stressful […]
Protecting AI-Enabled IoT Ecosystems from Cyber Threats
In today’s hyper-connected world, the integration of Artificial Intelligence (AI) and the Internet of Things (IoT) […]

KI-gestützte Angriffe machen deutschen Betrieben zu schaffen
Während Hacker KI bereits flächendeckend für ihre Angriffe missbrauchen, tun sich die Verteidiger noch schwer mit […]
KI-gestützte Angriffe machen deutschen Betrieben zu schaffen
Während Hacker KI bereits flächendeckend für ihre Angriffe missbrauchen, tun sich die Verteidiger noch schwer mit […]

Australian financial firm hit with lawsuit after massive data breach
Australian financial services firm FIIG Securities faces legal action from the Australian Securities and Investments Commission […]

GitHub to unbundle Advanced Security
GitHub announced plans to unbundle its GitHub Advanced Security (GHAS) product, breaking it up into two standalone products: […]

Hiring privacy experts is tough — here’s why
The demand for privacy professionals is soaring, but hiring an expert in this field is proving […]

Generative AI red teaming: Tips and techniques for putting LLMs to the test
Red teaming is a time-proven approach to testing and bolstering cybersecurity systems, but it has always […]

6 wichtige Punkte für Ihren Incident Response Plan
Lesen Sie, welche Schritte für Ihren Notfallplan besonders wichtig sind. PeopleImages.com – Yuri A – Shutterstock.com […]