Don't let mistakes bother you

If you don't care, you may become a victim of spam

BSI-Doppelstrategie für digitale Souveränität

width=”4743″ height=”2667″ sizes=”auto, (max-width: 4743px) 100vw, 4743px”>BSI-Präsidentin Claudia Plattner: “Je mehr vertrauenswürdige Produkte verfügbar sind, desto […]

83% of CISOs say staff shortage is major issue for defense

Most enterprise CISOs can’t remember a time when there wasn’ta cybersecurity talent shortage, but a new […]

How AI is reshaping cybersecurity operations

Generative AI has become a pervasive tool in the enterprise. According to a recent Boston Consulting […]

Top 5 Cyber Threats Facing Semiconductor Manufacturing

The semiconductor industry is at the epicentre of modern innovation, yet it is also a very […]

6 wichtige Punkte für Ihren Incident Response Plan

Lesen Sie, welche Schritte für Ihren Notfallplan besonders wichtig sind. PeopleImages.com – Yuri A – Shutterstock.com […]

Hunt Evil Your Practical Guide to Threat Hunting – Part 1

You might have heard a lot of buzz around this topic of “Threat Hunting” and want […]

New Front in Cyber Espionage: Chinese Hackers and AI Agents Target Global Cloud and Telecom Infrastructure

A perfect storm is brewing in cyberspace as sophisticated Chinese state-sponsored actors escalate attacks on cloud […]

Disgruntled developer gets four-year sentence for revenge attack on employer’s network

A software developer who launched disruptive logic bombs inside his employer’s network as an act of […]

Cyberangriff auf Colt: Support-Systeme nach Lösegelddrohung offline

Der TK-Konzern Colt kämpft seit einer Woche mit den Folgen einer Ransomware-Attacke. A9 STUDIO – shutterstock.com […]

Cyberangriff auf Versicherungsmakler BüchnerBarella

Die Versicherungsbranche ist ein attraktives Ziel für Cyberkriminelle. Jetzt hat es den deutschen Versicherungsmakler BüchnerBarella getroffen. […]

1 2 3 210