Don't let mistakes bother you

If you don't care, you may become a victim of spam

Europol has put an end to network behind 49 million fake accounts

On October 10, Europol, in cooperation with police authorities in Estonia, Finland, Latvia and Austria, raided […]

Cross-platform ransomware: Qilin weaponizes Linux binaries against Windows hosts

Agenda ransomware group, popularly known as Qilin, has been abusing legitimate remote management and file transfer […]

Data sovereignty proof: How to verify controls like ‘Project Texas’

As data sovereignty laws fracture the global internet, CSOs are scrutinizing ambitious new compliance blueprints, with […]

The 10 biggest issues CISOs and cyber teams face today

The CISO job is tough, and it’s getting tougher: 66% of security leaders surveyed for the […]

CryptoBind’s quantum ready approach to DPDP compliance

The Digital Personal Data Protection (DPDP) Act 2023 of India is a turning point in the […]

Die besten IAM-Tools

Identity & Access Management ist für sicherheitsbewusste Unternehmen im Zero-Trust-Zeitalter Pflicht. Das sind die besten IAM-Anbieter […]

Scammers try to trick LastPass users into giving up credentials by telling them they’re dead

Are you sure you’re still alive? If so, you may fall for a phishing scam aimed […]

Critical Microsoft WSUS flaw exploited in wild after insufficient patch

Microsoft released out-of-band patches on Thursday to “comprehensively” fix a critical vulnerability in the Windows Server […]

Agentless Network Monitoring: The New Standard for Cloud Security Visibility

How does agentless network monitoring work in cloud environments? Agentless network monitoring represents a fundamental shift in cloud […]

UN agreement on cybercrime criticized over risks to cybersecurity researchers

Cybersecurity researchers could face criminal charges for performing their legitimate work if the United Nations Convention […]