Don't let mistakes bother you

If you don't care, you may become a victim of spam

11 ways cybercriminals are making phishing more potent than ever

Phishing has long been a primary source for security breaches — a major issue that, despite […]

Für Cyberattacken gewappnet – Krisenkommunikation nach Plan

loading=”lazy” width=”400px”>Lesen Sie, welche Aspekte für einen Krisenkommunikationsplan entscheidend sind. Gorodenkoff – shutterstock.com Cyberangriffe fordern nicht […]

Quantenschlüssel aus der Sicht des CISO

loading=”lazy” width=”400px”>Quantum Key Distribution (QKD) dient dazu, Verschlüsselungsschlüssel sicher zwischen zwei Parteien zu verteilen. Shaiith – […]

FBI warns: beware of free online document converter tools

Improvements Microsoft has made to Office document security that disable macros and other embedded malware by […]

Oracle Cloud breach may impact 140,000 enterprise customers

A threat actor has reportedly breached Oracle Cloud infrastructure, exfiltrating six million sensitive authentication records and […]

KI als Turbo für Kriminelle

width=”2500″ height=”1406″ sizes=”(max-width: 2500px) 100vw, 2500px”>Europol warnt: Kriminelle nutzen KI, um ihre Operationen zu automatisieren und […]

New phishing campaign uses scareware to steal Apple credentials

A new phishing campaign targeting Mac systems employs scareware tactics to steal Apple IDs and passwords […]

Trump shifts cyberattack readiness to state and local governments in wake of info-sharing cuts

On March 19, the White House issued the first executive order (EO) to directly address cybersecurity […]

CISOs are taking on ever more responsibilities and functional roles – has it gone too far?

When George Gerchow was CISO at Sumo Logic, his responsibilities incorporated the kind of work typically […]

Kubernetes Security: Wie Sie Ihre Cluster (besser) absichern

Anatoliy Eremin | shutterstock.com Kubernetes hat sich unter Enterprise-Softwareentwicklern zu einem durchschlagenden Erfolg entwickelt. Das veranlasst […]

1 16 17 18 19 20 134