
Cursor’s autorun lets hackers execute arbitrary code
Oasis Security has uncovered a flaw in the widely used AI-powered code editor Cursor that lets […]

Ransomware upstart ‘The Gentlemen’ raises the stakes for OT‑heavy sectors
A new threat actor, The Gentlemen, has emerged as a fast-moving ransomware group that has rapidly […]

What the Salesloft Drift breaches reveal about 4th-party risk
The recent SalesLoft Drift breaches revealed an uncomfortable truth that keeps me up at night, and […]

Why Is Detecting Insider Threats So Hard—And How Can You Stay Ahead?
Insider threats come from people who already possess legitimate access—employees, contractors, partners. You cannot treat these […]
The Power of Collaboration: BFSI + Fintech for a Resilient Financial Ecosystem
In a decade of digital disruption, regulatory evolution and customer expectations; traditional Banking, Financial Services and […]

6 hot cybersecurity trends
It may be hard to believe, but ChatGPT, which brought generative AI to the masses and […]

OT-Security: Warum der Blick auf Open Source lohnt
Auch im OT-Security-Bereich stellen Open-Source-Lösungen eine kostengünstige Alternative zu kommerziellen Tools dar. MY STOCKERS – Shutterstock.com […]

Patch Tuesday priorities: Vulnerabilities in SAP NetWeaver and Microsoft NTLM and Hyper-V
CISOs with SAP NetWeaver AS Java servers in their environments should make sure admins patch two […]

Patch Tuesday priorities: Vulnerabilities in SAP NetWeaver and Microsoft NTLM and Hyper-V
CISOs with SAP NetWeaver AS Java servers in their environments should make sure admins patch two […]

Patch Tuesday priorities: Vulnerabilities in SAP NetWeaver and Microsoft NTLM and Hyper-V
CISOs with SAP NetWeaver AS Java servers in their environments should make sure admins patch two […]