Fortinet confirms new zero-day attacks against customer devices
Fortinet has confirmed that a new attack campaign observed recently against customer devices is exploiting an […]
The cybercrime industry continues to challenge CISOs in 2026
Cybercriminals have built structured criminal groups with an organizational model similar to that of a legitimate […]
NETSCOUT recognized for leadership in network detection and response
We’re proud to share that NETSCOUT has been recognized for industry-leading excellence in network detection and response […]
Smarter DDoS security at scale
In today’s digital landscape, encrypted traffic is the norm—not the exception. While encryption such as Transport […]
Ransomware-Attacke auf Verkehrsgesellschaft Main-Tauber
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/01/480442374_625365396806507_3730545703312550477_n.jpg?resize=854%2C480&quality=50&strip=all 854w, […]
Unterschätztes Risiko: Insider-Bedrohungen endlich ernst nehmen
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?quality=50&strip=all 2500w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692866681.png?resize=150%2C84&quality=50&strip=all 150w, […]
10 wichtige Security-Eigenschaften: So setzen Sie die Kraft Ihres IT-Sicherheitstechnik-Teams frei
Lesen Sie, worauf es bei der Zusammenarbeit zwischen Ihrem IT-Security- und Engineering-Team ankommt. Foto: Lipik Stock […]
Ransomware gang’s slip-up led to data recovery for 12 US firms
Twelve US companies hit by the INC ransomware group were able to recover encrypted data after […]
Trivial Telnet authentication bypass exposes devices to complete takeover
Computers with Telnet open are in immediate danger of being compromised due to a critical vulnerability […]
Spanish e-retailer PcComponentes denies report it was hacked
Spanish online electronics retailer PcComponentes has denied a hacker’s claims to have stolen data on its […]