EU vulnerability database goes live
A free, publicly accessible database for IT security vulnerabilities, the db.gcve.eu, has been created by GCVE […]
Secure web browsers for the enterprise compared: How to pick the right one
Web browsers have long been the security sinkhole of enterprise infrastructure. While email is often cited […]
Why HSMs Are Foundational to Digital Trust
The digital trust is not a theoretical notion anymore, it is the currency of the contemporary economy. All online transactions, […]
This Intune update isn’t optional — it’s a kill switch for outdated apps
Enterprises using Intune mobile application management (MAM) beware: Your apps won’t run soon if you haven’t […]
Mandiant pushes organizations to dump insecure NTLMv1 by releasing a way to crack it
Google’s Mandiant security division has come up with an unusual tactic to persuade organizations to stop […]
Neue EU-Schwachstellen-Datenbank gestartet
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?quality=50&strip=all 8960w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=150%2C84&quality=50&strip=all 150w, […]
Five Chrome extensions caught hijacking enterprise sessions
A coordinated campaign of malicious browser add-ons has bypassed Chrome Web Store’s defenses, weaponizing extensions advertised […]
Python-Bibliotheken für Hugging-Face-Modelle vergiftet
Python-Libraries sind mit manipulierten Metadaten in KI-Modellen infiziert und können beim Laden Schadcode ausgeführen. Agus_Gatam – […]
The culture you can’t see is running your security operations
Here’s what nobody admits: Your firewall isn’t the problem. Your SIEM isn’t the problem. That shiny […]
Fahndung nach Kopf von Black Basta
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?quality=50&strip=all 3008w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=150%2C84&quality=50&strip=all 150w, […]