Don't let mistakes bother you

If you don't care, you may become a victim of spam

Step-by-Step Guide to Real Threat Detection — Powered by Fidelis Security

In today’s threat landscape, the question is no longer “Will we be attacked?” but “How fast […]

4 big mistakes you’re probably still making in vulnerability management…and how to fix them

Let’s be honest folks, vulnerability management isn’t the same game it was five years ago. But […]

Ransomware-Angriff auf guenstiger.de

Das Portal von guenstiger.de ist online – was die Hacker jedoch im Backend angerichtet haben, darüber […]

Reporting lines: Could separating from IT help CISOs?

Reporting to the CFO instead of the CIO can help CISOs frame cybersecurity in business terms, […]

IT-Security ist keine Vertrauenssache

G Data warnt davor, die Komplexität heutiger Bedrohungsszenarien zu unterschätzen. Pictrider – shutterstock.com Geht es um […]

SAP NetWeaver customers urged to deploy patch for critical zero-day vulnerability

Attackers have been exploiting a critical zero-day vulnerability in the Visual Composer component of the SAP […]

Proof-of-concept bypass shows weakness in Linux security tools, claims Israeli vendor

An Israeli vendor was able to evade several leading Linux runtime security tools using a new […]

Die Bösen kooperieren, die Guten streiten sich

Eine Koalition einflussreicher CISOs sieht den G7-Gipfel 2025 als ideale Gelegenheit, die G7- und OECD-Mitgliedsstaaten zu […]

Commvault warns of critical Command Center flaw

Commvault is warning customers of a critical vulnerability affecting Command Center, a web-based management console for […]

Darcula phishing toolkit gets AI boost, democratizing cybercrime

Enterprise security teams face an immediate escalation in phishing threats as the notorious Darcula toolkit has […]

1 42 43 44 45 46 180