Don't let mistakes bother you

If you don't care, you may become a victim of spam

DeepSeek hit by cyberattack and outage amid breakthrough success

Chinese AI startup DeepSeek said it was hit by a cyberattack, prompting the company to restrict […]

US takes aim at healthcare cybersecurity with proposed HIPAA changes

The US Department of Health and Human Services (HHS) has launched a consultation on stricter rules […]

The cybersecurity skills gap reality: We need to face the challenge of emerging tech

The cybersecurity skills shortage remains a controversial topic. Research from ISC2 states that the current global […]

New ransomware group Funksec is quickly gaining traction

Threat reports for December showed a newcomer to the ransomware-as-a-service (RaaS) landscape quickly climbing the ranks. […]

Why You Should Hire a Virtual Data Protection Officer (vDPO) Now?

In an increasingly data-driven world, ensuring the protection of personal information has never been more crucial. […]

IT-Angriff auf das British Museum

Kurios: Ein ehemaliger Techniker hat im British Museum Systeme abgeschaltet. Mistervlad – Shutterstock.com Das weltbekannte British Museum bleibt […]

A pickle in Meta’s LLM code could allow RCE attacks

Meta’s large language model (LLM) framework, Llama, suffers a typical open-source coding oversight, potentially allowing arbitrary […]

CISOs’ top 12 cybersecurity priorities for 2025

Security chief Andrew Obadiaru’s to-do list for the upcoming year will be familiar to CISOs everywhere: […]

Cyberangriff auf Bundesdruckerei-Tochter

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?quality=50&strip=all 6235w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2476561975.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

Cybersecurity needs women — and it needs to treat them better

The participation of women in cybersecurity is vital, a non-negotiable proposition. Forget any current handwringing over […]

1 72 73 74 75 76 151