
Sind Macs noch sicher?
MacOS galt lange als „Malware-frei“. Eine Studie legt nahe: Diese Zeiten sind längst vorbei. Zyracuze | […]

Data deletion enters the ransomware chat
Ransomware remains one of the biggest cyber threats to companies today. In a survey by security provider […]

Die besten Hacker-Filme
Vorsicht, dieses Film-Listicle kann zu Prokrastination verführen! Nomad Soul | shutterstock.com Security-Profis und -Entscheider mit Hang […]

CISOs still cautious about adopting autonomous patch management solutions
Failing to patch vulnerabilities keeps biting CISOs. The most recent evidence: Last month, the Five Eyes […]

Securing cloud-native applications: Why a comprehensive API security strategy is essential
Despite their capabilities and benefits, cloud-native applications also present several security challenges. Application programming interfaces (APIs) […]

Mitel MiCollab VoIP authentication bypass opens new attack paths
Security researchers have discovered a new issue in the Mitel MiCollab enterprise VoIP platform that allows […]

Solving networking and security challenges in the modern branch
As organizations embrace digital transformation, branch offices have become critical hubs for innovation and operations. They […]

Romanian elections targeted with cyberattacks by foreign state-sponsored actors
Romania, an EU and NATO member state, faced tens of thousands of intrusion attempts — some […]
Bug Bounties: Hacking For a Paycheck
Bug bounties are like digital treasure hunts for hackers—except instead of hidden gold, they’re looking for […]

FBI-Tipps zum persönlichen Schutz vor KI-Angriffen
KI-Kriminalität nimmt zu. Deswegen veröffentlicht die US-Sicherheitsbehörde Ratschläge, wie man sich dagegen wappnet. Ralf Liebhold/shutterstock.com Die […]