Scammers use AI to make fake art seem real
Fraudsters have started using AI to create fake documents claiming that artworks are genuine or legally […]
Pirate activists have copied Spotify’s entire music library
A collective of pirate activists say they gained access to 256 million rows of metadata and […]
Inside Fidelis’ EDR Technology: What Sets Us Apart from Others
Key Takeaways Fidelis EDR uses behavioral analytics and 30-60-90-day telemetry to expose advanced threats with fewer […]
Think you can beat ransomware? RansomHouse just made it a lot harder
A recent upgrade to the RansomHouse ransomware operation has added new concerns for enterprise defenders, introducing […]
Hackers exploit Microsoft OAuth device codes to hijack enterprise accounts
Cybercriminals and state-sponsored hackers are increasingly exploiting Microsoft’s legitimate OAuth 2.0 device authorization process to hijack […]
What CISOs should know about the SolarWinds lawsuit dismissal
The US Securities and Exchange Commission’s Nov. 30 decision to dismiss its lawsuit against SolarWinds and […]
How to Build a DPDP-Ready Data Inventory in 30 Days
The Digital Personal Data Protection Act (DPDP Act) of India has plunged the organisations into a […]
Podcast: Die IT-Tops und -Flops 2025
Die Redaktion von Computerwoche, CIO und CSO sieht das IT-Jahr 2025 mit gemischten Gefühlen zu Ende […]
Iranian APT Prince of Persia returns with new malware and C2 infrastructure
Researchers have discovered new activity from a threat actor dubbed Prince of Persia that’s believed to […]
Top Trends to Expect in Enterprise Cloud Security in 2026
Key Takeaways Enterprise cloud security is shifting from tools, to platform-based solutions that integrate visibility and […]