
How CISOs can rebuild trust after a security incident
When incident response plans cover the aftermath, they typically focus solely on technical matters, such as […]

Password managers under increasing threat as infostealers triple and adapt
Security watchers warn of a three-fold increase in malware that targets credential stores, such as password […]

New family of data-stealing malware leverages Microsoft Outlook
CISOs have yet another attack vector to worry about with the discovery of a new family […]
Mastering PCAP Analysis: Tips and Tools for Effective Network Insights
In the world of network security, understanding what’s traveling across your network is pivotal. One of […]

Nico Lange: „Cybersicherheit ist eine Frage der Verteidigung“
Munich Security Conference Live Studio powered by APCO in Munich, Germany on February 15, 2025. (Photo […]

Websites der Bayerischen Staatsregierung angegriffen
Bayern: Staatskanzlei und das Staatsministerium für Digitales waren das Ziel einer DDoS-Attacke. Vlyaks – shutterstock.com Die […]

Ransomware gangs extort victims 17 hours after intrusion on average
Ransomware gangs are operating much more quickly than before, leaving less time for organizations to detect […]

How to evaluate and mitigate risks to the global supply chain
Enterprise security leaders face mounting pressure to protect their global IT supply chains against threat actors […]

4 Wege aus der Security-Akronymhölle
Gefangen im Buchstabensud? mikeledray | shutterstock.com Bevor Elon Musk zum Trump-Sidekick mutierte, wurde er in erster […]

Software Bill of Material umsetzen: Die besten SBOM-Tools
Nur wenn Sie wissen, was drinsteckt, können Sie sich sicher sein, dass alles mit rechten Dingen […]