
11 ways cybercriminals are making phishing more potent than ever
Phishing has long been a primary source for security breaches — a major issue that, despite […]

Für Cyberattacken gewappnet – Krisenkommunikation nach Plan
loading=”lazy” width=”400px”>Lesen Sie, welche Aspekte für einen Krisenkommunikationsplan entscheidend sind. Gorodenkoff – shutterstock.com Cyberangriffe fordern nicht […]

Quantenschlüssel aus der Sicht des CISO
loading=”lazy” width=”400px”>Quantum Key Distribution (QKD) dient dazu, Verschlüsselungsschlüssel sicher zwischen zwei Parteien zu verteilen. Shaiith – […]

FBI warns: beware of free online document converter tools
Improvements Microsoft has made to Office document security that disable macros and other embedded malware by […]

Oracle Cloud breach may impact 140,000 enterprise customers
A threat actor has reportedly breached Oracle Cloud infrastructure, exfiltrating six million sensitive authentication records and […]

KI als Turbo für Kriminelle
width=”2500″ height=”1406″ sizes=”(max-width: 2500px) 100vw, 2500px”>Europol warnt: Kriminelle nutzen KI, um ihre Operationen zu automatisieren und […]

New phishing campaign uses scareware to steal Apple credentials
A new phishing campaign targeting Mac systems employs scareware tactics to steal Apple IDs and passwords […]

Trump shifts cyberattack readiness to state and local governments in wake of info-sharing cuts
On March 19, the White House issued the first executive order (EO) to directly address cybersecurity […]

CISOs are taking on ever more responsibilities and functional roles – has it gone too far?
When George Gerchow was CISO at Sumo Logic, his responsibilities incorporated the kind of work typically […]

Kubernetes Security: Wie Sie Ihre Cluster (besser) absichern
Anatoliy Eremin | shutterstock.com Kubernetes hat sich unter Enterprise-Softwareentwicklern zu einem durchschlagenden Erfolg entwickelt. Das veranlasst […]