Don't let mistakes bother you

If you don't care, you may become a victim of spam

Hackers booby trap NPM with cross-language imposter packages

Hackers are abusing the Node Package Manager (NPM) registry — a database of JavaScript packages — […]

Ransomware-Bande erpresst Brauerei Oettinger

Cyberkriminelle haben die IT-Systeme der Brauerei Oettinger verschlüsselt. Die Produktion ist nicht betroffen. defotoberg – shutterstock.com […]

The 8 security metrics that matter most

KPIs and metrics are indispensable for evaluating the effectiveness of enterprise cyber defenses. These crucial tools […]

Quantum supremacy: Cybersecurity’s ultimate arms race has China way in front

Imagine a vast, ancient library, the Library of All Secrets. Within its countless shelves reside every […]

„Eine Krisensituation erfordert klare Entscheidungen“

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?quality=50&strip=all 2126w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Volker-Buss_16_9.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

Critical flaw in AI agent dev tool Langflow under active exploitation

The US Cybersecurity and Infrastructure Security Agency (CISA) has evidence that a critical flaw fixed last […]

Stadt Ellwangen von Cyberattacke getroffen

Die IT-Systeme der Stadt Ellwangen wurden teilweise durch eine Cyberattacke lahmgelegt. Stadt Ellwangen Die Stadt Ellwangen […]

Top tips for successful threat intelligence usage

Enterprises looking to stem the tide of breaches and attacks usually end up purchasing a threat […]

10 Kennzahlen, die CISOs weiterbringen

Geht es um Security-Kennzahlen, sollten CISOs sich auf das Wesentliche fokussieren. Foto: Vadym Nechyporenko – shutterstock.com […]

Fake resumes targeting HR managers now come with updated backdoor

CISOs should warn HR staff not to be fooled by a new spear phishing campaign that […]