
Cyberattacke auf berlin.de
width=”2490″ height=”1400″ sizes=”(max-width: 2490px) 100vw, 2490px”>Auf Berlins Info- und Serviceportal berlin.de ging Ende April 2025 nichts […]

The state of intrusions: Stolen credentials and perimeter exploits on the rise, as phishing wanes
CISOs seeking insights into the latest cyberattack trends should note that cybercriminals’ initial access methods appear […]

Ransomware-Attacke bei Hitachi Vantara
Die Ransomware-Gruppe Akira soll bei Hitachis IT-Services- und Infrastruktur-Tochter zugeschlagen haben. TY Lim | shutterstock.com Vertreter […]

Was ist ein Keylogger?
Keylogger sind Malware der alten Schule. Lesen Sie, wie die Tools zur Tastaturüberwachung funktionieren und warum […]

IBM aims for autonomous security operations
IBM has added new agentic and automation capabilities to its managed detection and response (MDR) services […]

Cisco automates AI-driven security across enterprise networks
Cisco today announced a range of AI-driven security enhancements, including improved threat detection and response capabilities […]

AI looms large on the RSA Conference agenda
Thousands of delegates (41,000 attended in 2024) and around 600 exhibitors are in San Francisco to […]

Secure by Design is likely dead at CISA. Will the private sector make good on its pledge?
In April 2023, the US Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation, […]

Step-by-Step Guide to Real Threat Detection — Powered by Fidelis Security
In today’s threat landscape, the question is no longer “Will we be attacked?” but “How fast […]

4 big mistakes you’re probably still making in vulnerability management…and how to fix them
Let’s be honest folks, vulnerability management isn’t the same game it was five years ago. But […]