Don't let mistakes bother you

If you don't care, you may become a victim of spam

Step-by-Step Guide to Real Threat Detection — Powered by Fidelis Security

In today’s threat landscape, the question is no longer “Will we be attacked?” but “How fast […]

4 big mistakes you’re probably still making in vulnerability management…and how to fix them

Let’s be honest folks, vulnerability management isn’t the same game it was five years ago. But […]

Ransomware-Angriff auf guenstiger.de

Das Portal von guenstiger.de ist online – was die Hacker jedoch im Backend angerichtet haben, darüber […]

Reporting lines: Could separating from IT help CISOs?

Reporting to the CFO instead of the CIO can help CISOs frame cybersecurity in business terms, […]

Marks & Spencer räumt Cyberangriff ein

Der britische Retail-Riese Marks & Spencer wurde von Cyberkriminellen heimgesucht und kämpft nun mit den Folgen. […]

IT-Security ist keine Vertrauenssache

G Data warnt davor, die Komplexität heutiger Bedrohungsszenarien zu unterschätzen. Pictrider – shutterstock.com Geht es um […]

SAP NetWeaver customers urged to deploy patch for critical zero-day vulnerability

Attackers have been exploiting a critical zero-day vulnerability in the Visual Composer component of the SAP […]

Proof-of-concept bypass shows weakness in Linux security tools, claims Israeli vendor

An Israeli vendor was able to evade several leading Linux runtime security tools using a new […]

Die Bösen kooperieren, die Guten streiten sich

Eine Koalition einflussreicher CISOs sieht den G7-Gipfel 2025 als ideale Gelegenheit, die G7- und OECD-Mitgliedsstaaten zu […]

Commvault warns of critical Command Center flaw

Commvault is warning customers of a critical vulnerability affecting Command Center, a web-based management console for […]

1 9 10 11 12 13 148