Nikkei-Daten über Slack-Konto eines Mitarbeiters geleakt
Ein kompromittierter Rechner und schon hatten Kriminelle alles Nötige, um auf Nikkeis Slack-Plattform zuzugreifen. soraneko | […]
Flaw in React Native CLI opens dev servers to attacks
A critical remote-code execution (RCE) flaw in the widely used @react-native-community/cli (and its server API) lets […]
Verdacht des systematischen Missbrauchs von Zahlungsdienstleistern
width=”2496″ height=”1404″ sizes=”auto, (max-width: 2496px) 100vw, 2496px”>Die Beschuldigten sollen zur Abwicklung von Zahlungen vier große deutsche […]
KI-Malware ist keine Theorie mehr
KI boomt auch unter Cyberkriminellen. Die ersten operativen Ergebnisse dieses Trends beleuchten Google-Sicherheitsforscher in einem aktuellen […]
Digital health can’t scale if cybersecurity falls behind
When the world faced COVID-19, I watched something remarkable happen. Artificial intelligence (AI) systems, which I […]
Chinese hackers target Western diplomats using hard-to-patch Windows shortcut flaw
Chinese hackers have been spotted targeting European diplomats using a longstanding Windows shortcut vulnerability that’s been […]
What past ERP mishaps can teach CISOs about security platformization
Research studies indicate that the average enterprise has between 40 and 80 separate security tools, a […]
9 top bug bounty programs launched in 2025
Bug bounty programs remain a crucial component of cybersecurity strategies in 2025, offering organizations the ability […]
Quantum Computing & the Future of Tokenisation Security
The world of digital economy is becoming more and more uncertain with the balance between innovation […]
Google researchers detect first operational use of LLMs in active malware campaigns
Threat actors are now actively deploying AI-enabled malware in their operations. Google Threat Intelligence Group (GTIG) […]