Don't let mistakes bother you

If you don't care, you may become a victim of spam

Online-Betrüger setzen auf KI und synthetische Identitäten

width=”2432″ height=”1368″ sizes=”(max-width: 2432px) 100vw, 2432px”>Oft reichen wenige echte Datenfragmente – etwa Name und Geburtsdatum – […]

Überwachungssoftware infiziert gezielt Smartphones

Fingierte Messenger-Apps täuschen ihre Opfer und führen so freiwillig zur Installation der Schadsoftware. siro46 – shutterstock.com […]

CISOs rethink hiring to emphasize skills over degrees and experience

For decades security chiefs have trained their sights on job applicants with university degrees. But ongoing […]

SBOM erklärt: Was ist eine Software Bill of Materials?

Softwareentwicklung und Autoproduktion haben mehr gemein, als man denkt. Lesen Sie, was Sie zum Thema Software […]

The most dangerous time for enterprise security? One month after an acquisition

The period right after an acquisition closes is the most dangerous time for enterprise security, for […]

New ResolverRAT malware targets healthcare and pharma orgs worldwide

Security researchers have observed a new malware payload deployed in attacks against the healthcare and pharmaceutical […]

Cyberangriff kostet IKEA-Betreiber mehrere Millionen

Die Folgen des Ransomware-Angriffs auf den Franchise-Nehmer der IKEA-Filialen in Südosteuropa sind noch immer zu spüren. […]

China alleges US cyber espionage during the Asian Winter Games, names 3 NSA agents

China has accused the US of conducting more than 170,000 cyberattacks against the Asian Winter Games […]

Incomplete patching leaves Nvidia, Docker exposed to DOS attacks

A critical race condition bug affecting the Nvidia Container Toolkit, which received a fix in September, […]

Agentic AI is both boon and bane for security pros

Cybersecurity stands at a crossroads with agentic AI. Never have we had such a powerful tool […]