
Darcula phishing toolkit gets AI boost, democratizing cybercrime
Enterprise security teams face an immediate escalation in phishing threats as the notorious Darcula toolkit has […]

Vor diesen Ransomware-Banden sollten Sie sich hüten
loading=”lazy” width=”400px”>Ransomware-Attacken werden immer mehr. Höchste Zeit, die Schutzmaßnahmen hochzufahren. Zephyr_p – shutterstock.com In den ersten […]

Cybercriminals switch up their top initial access vectors of choice
Third-party involvement in breaches and exploitation of vulnerabilities have become more important factors in security breaches, […]

6 types of risk every organization must manage — and 4 strategies for doing it
Risk management is the process of identifying, analyzing, and mitigating uncertainties and threats that can harm […]

Cyber Risk Assessments: Risikobewertung hilft CISOs
Mit Hilfe von Cyber Risk Assessments können CISOs nicht nur das konkrete Risiko im Unternehmen ermitteln, […]

Lesson from huge Blue Shield California data breach: Read the manual
CISOs can learn two lessons from a US health insurance provider’s admission this month that misconfiguring […]

As clock ticks, vendors slowly patch critical flaw in AMI MegaRAC BMC firmware
Weeks after BIOS developer AMI released an update fixing a critical vulnerability in its MegaRAC baseband […]

Trotz Back-Up: 86 Prozent der Unternehmen zahlen Lösegeld
80 Prozent der Cyberangriffe beginnen mit kompromittierten Zugangsdaten und einem Active Directory. Andrey_Popov – shutterstock.com Cybertools […]

GitHub secrets: Deleted files still pose risks
Deleted files within public GitHub repositories could still be exposing secrets like API keys, tokens, and […]
10 Best practices for enterprise data loss prevention in 2025
Cybersecurity Insiders’ Insider Threat Report 2023 states that 74% of organizations are moderately or more vulnerable […]