Why can’t enterprises get a handle on the cloud misconfiguration problem?
Seven years ago, I wrote about how cloud security configuration errors were putting enterprise data at […]
Data Security Posture Management: Die besten DSPM-Tools
Data Security Posture Management erfordert nicht nur die richtigen Tools, sondern auch eine entsprechende Vorbereitung. Foto: […]
Malicious npm packages contain Vidar infostealer
Malicious code continues to be uploaded to open source repositories, making it a challenge for responsible […]
Cisco fixes critical flaws in Unified Contact Center Express
Cisco released patches for two critical vulnerabilities in its Unified Contact Center Express (CCX) that could […]
Nikkei’s Slack breach leaks sensitive data from more than 17,000 users
Japanese media company Nikkei has confirmed that a security breach of its Slack accounts has potentially […]
Nikkei-Daten über Slack-Konto eines Mitarbeiters geleakt
Ein kompromittierter Rechner und schon hatten Kriminelle alles Nötige, um auf Nikkeis Slack-Plattform zuzugreifen. soraneko | […]
Flaw in React Native CLI opens dev servers to attacks
A critical remote-code execution (RCE) flaw in the widely used @react-native-community/cli (and its server API) lets […]
Verdacht des systematischen Missbrauchs von Zahlungsdienstleistern
width=”2496″ height=”1404″ sizes=”auto, (max-width: 2496px) 100vw, 2496px”>Die Beschuldigten sollen zur Abwicklung von Zahlungen vier große deutsche […]
KI-Malware ist keine Theorie mehr
KI boomt auch unter Cyberkriminellen. Die ersten operativen Ergebnisse dieses Trends beleuchten Google-Sicherheitsforscher in einem aktuellen […]
Digital health can’t scale if cybersecurity falls behind
When the world faced COVID-19, I watched something remarkable happen. Artificial intelligence (AI) systems, which I […]