
Bedrohungs-Monitoring: Die 10 besten Tools zur Darknet-Überwachung
Lesen Sie, worauf es beim Darknet-Monitoring ankommt und welche Tools dafür am besten geeignet sind. Foto: […]

New Rowhammer technique against DDR5 achieves privilege escalation
Researchers have devised a new technique to trigger Rowhammer bit flips inside the memory cells of […]

WatchGuard patches ‘critical’ VPN flaw in firewalls that could lead to compromise
WatchGuard has patched a dangerous branch office and mobile VPN configuration vulnerability affecting nearly three dozen […]

Meet ShadowLeak: ‘Impossible to detect’ data theft using AI
For years threat actors have used social engineering to trick employees into helping them steal corporate […]
Zuckerberg Launches Meta Ray-Ban Display: AI Glasses With Built-In Screen
Meta has launched the $799 Ray-Ban Display, its first pair of AI glasses featuring a built-in […]

Palo Alto Networks acknowledges browser malware risks, validating SquareX’s LMR attack findings
SquareX’s research on Last Mile Reassembly (LMR) attacks, which the browser-native cybersecurity company disclosed at DEF […]

Microsoft schaltet gefährliches Phishing-Netzwerk ab
Über die Phishing-as-a-Service-Plattform RaccoonO365 sollen mehr als 5.000 Microsoft-Accounts in 94 Ländern kompromittiert worden sein. janews […]

Ransomware-Lage verschärft sich drastisch
Zscaler gewährt Einblicke in das globale Ransomware-Ökosystem. JLStock Der jährliche ThreatLabz Ransomware-Report (PDF) von Zscaler hält […]

Where CISOs need to see Splunk go next
This month Splunk brought its annual customer conference, .Conf, to Boston, with parent company Cisco along […]

AI is altering entry-level cyber hiring — and the nature of the skills gap
Teamwork, problem-solving, and analytical thinking outrank core technical skills such as data security and cloud security […]