Don't let mistakes bother you

If you don't care, you may become a victim of spam

Wie im Netz gezielt manipuliert wird

Cyberkriminelle nutzen SIM-Karten vom Graumarkt für virtuelle Bot-Armeen. K2LStudio – shutterstock.com Ein umfangreicher internationaler Graumarkt mit […]

SAML authentication broken almost beyond repair

Researchers have uncovered fresh techniques for breaking SAML-based authentication, further undermining the security assurances offered by […]

Battering RAM hardware hack breaks secure CPU enclaves

Confidential computing, powered by hardware technologies such as Intel SGX (Software Guard Extensions) and AMD SEV […]

Cybersecurity isn’t underfunded — It’s undermanaged

Much of the narrative I come across online around cybersecurity budgets revolves around convincing the Board […]

Ivantis EPM-Systeme anfällig für Angriffe

Unternehmen sollten ihre EPM-Systeme von Ivanti so bald wie möglich patchen, da dort schwerwiegende Sicherheitslücken entdeckt […]

How to justify your security investments

In modern corporate environments, investments in security technologies are no longer judged solely on technical maturity. […]

Mit MXDR gegen den Fachkräftemangel

Mit dem Einsatz von MXDR können Unternehmen ihr IT-Security-Team durch Experten erweitern und deren Expertise nutzen. […]

Fortinet admins urged to update software to close FortiCloud SSO holes

Admins using FortiCloud SSO (single sign on) to authenticate access to Fortinet products are urged to […]

Making cybercrime illegal won’t stop it; making cybersec research legal may

Hacking into computer systems is illegal in many countries — even if you’re a cybersecurity researcher […]

Hidden .NET HTTP proxy behavior can open RCE flaws in apps — a security issue Microsoft won’t fix

Researchers uncovered an unexpected behavior of HTTP client proxies when created in .NET code, potentially allowing […]

1 2 3 297