How Deception Fits into Zero Trust and MITRE Shield Frameworks
A technical analysis of deception technology’s role in modern cybersecurity frameworks In today’s evolving threat landscape, […]

Neue EU-Schwachstellen-Datenbank geht an den Start
Die neue EU-Schwachstellen-Datenbank EUVD soll das CVE-Programm ergänzen. artjazz – shutterstock.com Seit dieser Woche verfügt die […]

CISA adds the notorious TeleMessage flaw to KEV list
CISA has added a medium-severity vulnerability discovered in TeleMessage TM SGNL, the messaging application that was […]
5-Step Plan for Prevention of Social Engineering Attacks
Cyber threats aren’t always about complex code or advanced hacking tools. Often, they start with a […]

Marks & Spencer räumt Datendiebstahl ein
Der britische Retail-Riese Marks & Spencer wurde von Cyberkriminellen heimgesucht und kämpft nun mit den Folgen. […]

Spain to vet power plants’ cybersecurity for ‘great blackout’ cause
The Spanish government has yet to determine the specific causes of the blackout that left the country […]

Patch Tuesday for May: Five zero day vulnerabilities CISOs should focus on
CISOs need to pay attention to patching five zero day Windows vulnerabilities and two other holes […]

4 critical leadership priorities for CISOs in the AI era
Everyone knows CISOs aren’t really working that hard in those cushy offices. Heck, they’re only thwarting compliance nightmares, […]

12 AI terms you (and your flirty chatbot) should know by now
With the meteoric rise of generative AI (genAI) in the past few years, from data-scientist discussion groups to […]

Researchers bypass Intel’s Spectre fixes — six years of CPUs at risk
Six years after Intel made architectural changes to its CPUs to mitigate speculative execution vulnerabilities, researchers […]