
Major infostealer network taken down in Interpol raid
Interpol, together with 26 countries and several cybersecurity companies, has carried out a major international operation […]

Detecting Ransomware on Networks at Scale Using Traffic Analysis
Ransomware attacks are still causing serious financial and reputational damage to organizations. In May 2024, they […]

CSO Awards 2025 showcase world-class security strategies
For more than a decade, the CSO Awards have recognized security projects that demonstrate outstanding thought […]

How to Create a Linux Bash Script – And What You Can Do With It
So, you’ve heard about Bash scripting and you’re curious what all the buzz is about? Whether […]

June Patch Tuesday advice for CSOs: Defense-in-depth needed to stop RCEs
This month’s Patch Tuesday fixes highlight a troubling pattern of remote code execution (RCE) holes being […]

The critical role that partnerships play in shrinking the cyber skills gap
Organizations everywhere are facing a perfect storm of cybersecurity challenges. As AI accelerates the volume and […]

Forgotten patches: The silent killer
Security breaches rarely come crashing through the front door. More often, they creep in through vulnerabilities […]

Neues GenAI-Tool soll Open-Source-Sicherheit erhöhen
srcset=”https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2322281155.jpg?quality=50&strip=all 5666w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2322281155.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2322281155.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2322281155.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2322281155.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2322281155.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2322281155.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_2322281155.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

China-linked hackers target cybersecurity firms, governments in global espionage campaign
China-linked threat actors — particularly groups tied to advanced cyber-espionage campaigns, such as PurpleHaze and ShadowPad […]

8 things CISOs have learned from cyber incidents
When a cyber incident happens, it’s more than just an isolated event. For many CISOs, it […]