Don't let mistakes bother you

If you don't care, you may become a victim of spam

How to Build a DPDP-Ready Data Inventory in 30 Days

The Digital Personal Data Protection Act (DPDP Act) of India has plunged the organisations into a […]

Podcast: Die IT-Tops und -Flops 2025

Die Redaktion von Computerwoche, CIO und CSO sieht das IT-Jahr 2025 mit gemischten Gefühlen zu Ende […]

Iranian APT Prince of Persia returns with new malware and C2 infrastructure

Researchers have discovered new activity from a threat actor dubbed Prince of Persia that’s believed to […]

Top Trends to Expect in Enterprise Cloud Security in 2026

Key Takeaways Enterprise cloud security is shifting from tools, to platform-based solutions that integrate visibility and […]

WatchGuard fixes ‘critical’ zero-day allowing firewall takeover

WatchGuard has issued an urgent patch alert for its Firebox firewall appliances after discovering a critical-rated […]

Attackers bring their own passwords to Cisco and Palo Alto VPNs

Security researchers have flagged a coordinated credential-based campaign targeting VPN authentication endpoints from Cisco and Palo […]

Cisco bestätigt Zero-Day-Exploit für Secure Email

Cisco hat eine Zero-Day-Lücke in seinen Secure-Email-Produkten entdeckt. JarTee – shutterstock.com Cisco Talos hat kürzlich eine […]

Managing agentic AI risk: Lessons from the OWASP Top 10

LLM-powered chatbots have risks that we see playing out in the headlines on a nearly daily […]

Positiv denken für Sicherheitsentscheider: 6 Mindsets, die Sie sofort ablegen sollten

In einem falschen Security-Mindset gefangen? Foto: Paul Craft – shutterstock.com Dass Jobs im Bereich Cybersecurity ein […]

React2Shell is the Log4j moment for front end development

Attackers have upped the ante in their exploits of a recently-disclosed maximum severity vulnerability in React […]

1 2 3 302