
BSI warnt vor Cyberattacken auf Energieversorgung
Die BSI-Präsidentin Claudia Plattner fordert einen besseren IT-Schutz für die Energieversorgung in Deutschland. elxeneize – shutterstock.com […]

The 7 unwritten rules of leading through crisis
Virtually all enterprises have some form of crisis management plan in place. Yet simply creating a […]

Sieben gängige Wege, ein Smartphone zu hacken
Angriffsvektoren gibt es etliche, doch wenn der Mensch aufpasst, lassen sich viele neutralisieren. Tero Vesalainen – […]
Effective Deception for Zero Day Attacks: Strategies for Cyber Defense
Deception for Zero day attacks has become a crucial strategy as these devastating exploits continue to […]

Over 91% of companies sacrifice hybrid cloud security in the AI adoption rush
A startling 91% of organizations admit to making risky security compromises in their hybrid cloud environments […]
How Fidelis Deception Turns Your Attack Surface into a Defensive Advantage
What if attackers are already inside your network—and you don’t even know it? Traditional security focuses […]

Beijing may have breached US government systems before Cityworks plugged a critical flaw
A now-patched high-severity security flaw affecting Trimble Cityworks — a specialized software used by local governments […]

Cyberattacke auf Dienstgeräte des Landratsamt Bodenseekreis
Aufgrund einer Cyberattacke sind aktuell alle Diensthandys und Tablets des Landratsamt Bodenseekreis außer Betrieb. 512r – […]

Critical infrastructure under attack: Flaws becoming weapon of choice
Threat actors are increasingly exploiting vulnerabilities to attack critical infrastructure systems. Critical infrastructure organizations accounted for […]

BKA gelingt Schlag gegen Cyberkriminelle
Im Rahen der “Operation Endgame” wurden die derzeit einflussreichsten Schadsoftware-Varianten vom Netz genommen. BKA Sicherheitsbehörden ist […]