
Hackers booby trap NPM with cross-language imposter packages
Hackers are abusing the Node Package Manager (NPM) registry — a database of JavaScript packages — […]

Ransomware-Bande erpresst Brauerei Oettinger
Cyberkriminelle haben die IT-Systeme der Brauerei Oettinger verschlüsselt. Die Produktion ist nicht betroffen. defotoberg – shutterstock.com […]

The 8 security metrics that matter most
KPIs and metrics are indispensable for evaluating the effectiveness of enterprise cyber defenses. These crucial tools […]

Quantum supremacy: Cybersecurity’s ultimate arms race has China way in front
Imagine a vast, ancient library, the Library of All Secrets. Within its countless shelves reside every […]

„Eine Krisensituation erfordert klare Entscheidungen“
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?quality=50&strip=all 2126w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

Critical flaw in AI agent dev tool Langflow under active exploitation
The US Cybersecurity and Infrastructure Security Agency (CISA) has evidence that a critical flaw fixed last […]

Stadt Ellwangen von Cyberattacke getroffen
Die IT-Systeme der Stadt Ellwangen wurden teilweise durch eine Cyberattacke lahmgelegt. Stadt Ellwangen Die Stadt Ellwangen […]

Top tips for successful threat intelligence usage
Enterprises looking to stem the tide of breaches and attacks usually end up purchasing a threat […]

10 Kennzahlen, die CISOs weiterbringen
Geht es um Security-Kennzahlen, sollten CISOs sich auf das Wesentliche fokussieren. Foto: Vadym Nechyporenko – shutterstock.com […]

Fake resumes targeting HR managers now come with updated backdoor
CISOs should warn HR staff not to be fooled by a new spear phishing campaign that […]