Scattered Lapsus$ Hunters target Zendesk users with fake domains
Scattered Lapsus$ Hunters targeted Zendesk users through more than 40 fake domains designed to steal credentials […]
Spotlight: Making the most of multicloud
Download the December 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]
The CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we […]
Empathetic policy engineering: The secret to better security behavior and awareness
In many companies, IT security guidelines encounter resistance because employees perceive them as obstructive or impractical. […]
CryptoBind Secures the Core of National Digital Healthcare Transformation
The healthcare industry is experiencing a digital revolution. Starting with telemedicine and digital prescriptions, with in-built […]
CSO in eigener Sache: Mit Smart Answers zu mehr Information
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2642127909.jpg?quality=50&strip=all 5350w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2642127909.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2642127909.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2642127909.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2642127909.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2642127909.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2642127909.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2642127909.jpg?resize=150%2C84&quality=50&strip=all 150w, […]
EU ‘Chat Control’ proposals should be red flag to businesses everywhere
Data privacy campaigners have warned that any celebration of the news that the European Union (EU) […]
Security researchers caution app developers about risks in using Google Antigravity
Google’s Antigravity development tool for creating artificial intelligence agents has been out for less than 11 […]
6 Stages in a Threat Intelligence Lifecycle: Where Does Fidelis Fit In?
Key Takeaways The cybersecurity lifecycle operates through five stages (Identify, Protect, Detect, Respond, Recover) while threat […]
OpenAI admits data breach after analytics partner hit by phishing attack
OpenAI has suffered a significant data breach after hackers broke into the systems of its analytics […]