Cybersecurity risk will accelerate this year, fueled in part by AI, says World Economic Forum
Cybersecurity risk will accelerate this year, fueled by advances in AI, deepening geopolitical fragmentation and the […]
Top 5 Enterprise Cloud Security Solutions to Consider in 2026
Key Takeaways Enterprise cloud security in 2026 requires platform-level solutions—not isolated tools—because risks now span multi-cloud, […]
Ransomware-Banden erpressen Opfer mit Compliance-Verstößen
Ransomware-Gruppen setzen ihre Opfer vermehrt mit Compliance-Verstößen unter Druck. Digitala World – shutterstock.com Ransomware-Attacken zählen nach […]
High-severity bug in Broadcom software enables easy WiFi denial-of-service
A high-severity flaw in Broadcom WiFi chipset software can allow an attacker within radio range to […]
For application security: SCA, SAST, DAST and MAST. What next?
I have stared at enough scanner dashboards to recognize the pattern. SAST flags theoretical flaws that […]
Top 10 vendors for AI-enabled security — according to CISOs
Venture capital may be flowing to trendy AI security startups, but battle-tested CISOs seem to be […]
The Real Cost of a Data Breach: Why Data Protection Is Now a Boardroom Priority
Organizations will start and possibly end with regulatory fines when discussing the cost of data breach. Although the fines […]
Notorious BreachForums hacking site hit by ‘doomsday’ leak of 324,000 criminal users
Prominent crime forum BreachForums has suffered a new and possibly fatal blow to its reputation after […]
Shai-Hulud & Co.: Die Supply Chain als Achillesferse
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?quality=50&strip=all 4096w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=150%2C84&quality=50&strip=all 150w, […]
Malicious npm packages target the n8n automation platform in a supply chain attack
Threat actors were spotted weaponizing the n8n automation ecosystem this week, slipping malicious npm packages into […]