Cross-platform ransomware: Qilin weaponizes Linux binaries against Windows hosts
Agenda ransomware group, popularly known as Qilin, has been abusing legitimate remote management and file transfer […]
Data sovereignty proof: How to verify controls like ‘Project Texas’
As data sovereignty laws fracture the global internet, CSOs are scrutinizing ambitious new compliance blueprints, with […]
The 10 biggest issues CISOs and cyber teams face today
The CISO job is tough, and it’s getting tougher: 66% of security leaders surveyed for the […]
CryptoBind’s quantum ready approach to DPDP compliance
The Digital Personal Data Protection (DPDP) Act 2023 of India is a turning point in the […]
Die besten IAM-Tools
Identity & Access Management ist für sicherheitsbewusste Unternehmen im Zero-Trust-Zeitalter Pflicht. Das sind die besten IAM-Anbieter […]
Scammers try to trick LastPass users into giving up credentials by telling them they’re dead
Are you sure you’re still alive? If so, you may fall for a phishing scam aimed […]
Critical Microsoft WSUS flaw exploited in wild after insufficient patch
Microsoft released out-of-band patches on Thursday to “comprehensively” fix a critical vulnerability in the Windows Server […]
Agentless Network Monitoring: The New Standard for Cloud Security Visibility
How does agentless network monitoring work in cloud environments? Agentless network monitoring represents a fundamental shift in cloud […]
UN agreement on cybercrime criticized over risks to cybersecurity researchers
Cybersecurity researchers could face criminal charges for performing their legitimate work if the United Nations Convention […]
Lazarus group targets European drone makers in new espionage campaign
Cybersecurity researchers from ESET have identified a new Lazarus Group campaign targeting European defense contractors, particularly […]