Don't let mistakes bother you

If you don't care, you may become a victim of spam

EU vulnerability database goes live

A free, publicly accessible database for IT security vulnerabilities, the db.gcve.eu, has been created by GCVE […]

Secure web browsers for the enterprise compared: How to pick the right one

Web browsers have long been the security sinkhole of enterprise infrastructure. While email is often cited […]

Why HSMs Are Foundational to Digital Trust 

The digital trust is not a theoretical notion anymore, it is the currency of the contemporary economy. All online transactions, […]

This Intune update isn’t optional — it’s a kill switch for outdated apps

Enterprises using Intune mobile application management (MAM) beware: Your apps won’t run soon if you haven’t […]

Mandiant pushes organizations to dump insecure NTLMv1 by releasing a way to crack it

Google’s Mandiant security division has come up with an unusual tactic to persuade organizations to stop […]

Neue EU-Schwachstellen-Datenbank gestartet

srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?quality=50&strip=all 8960w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

Five Chrome extensions caught hijacking enterprise sessions

A coordinated campaign of malicious browser add-ons has bypassed Chrome Web Store’s defenses, weaponizing extensions advertised […]

Python-Bibliotheken für Hugging-Face-Modelle vergiftet

Python-Libraries sind mit manipulierten Metadaten in KI-Modellen infiziert und können beim Laden Schadcode ausgeführen. Agus_Gatam – […]

The culture you can’t see is running your security operations

Here’s what nobody admits: Your firewall isn’t the problem. Your SIEM isn’t the problem. That shiny […]

Fahndung nach Kopf von Black Basta

srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?quality=50&strip=all 3008w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=150%2C84&quality=50&strip=all 150w, […]