Don't let mistakes bother you

If you don't care, you may become a victim of spam

Ransomware-Banden erpressen Opfer mit Compliance-Verstößen

Ransomware-Gruppen setzen ihre Opfer vermehrt mit Compliance-Verstößen unter Druck. Digitala World – shutterstock.com Ransomware-Attacken zählen nach […]

High-severity bug in Broadcom software enables easy WiFi denial-of-service

A high-severity flaw in Broadcom WiFi chipset software can allow an attacker within radio range to […]

For application security: SCA, SAST, DAST and MAST. What next?

I have stared at enough scanner dashboards to recognize the pattern. SAST flags theoretical flaws that […]

Top 10 vendors for AI-enabled security — according to CISOs

Venture capital may be flowing to trendy AI security startups, but battle-tested CISOs seem to be […]

The Real Cost of a Data Breach: Why Data Protection Is Now a Boardroom Priority

Organizations will start and possibly end with regulatory fines when discussing the cost of data breach. Although the fines […]

Notorious BreachForums hacking site hit by ‘doomsday’ leak of 324,000 criminal users

Prominent crime forum BreachForums has suffered a new and possibly fatal blow to its reputation after […]

Shai-Hulud & Co.: Die Supply Chain als Achillesferse

srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?quality=50&strip=all 4096w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

Malicious npm packages target the n8n automation platform in a supply chain attack

Threat actors were spotted weaponizing the n8n automation ecosystem this week, slipping malicious npm packages into […]

Iran-linked MuddyWater APT deploys Rust-based implant in latest campaign

Iran-linked advanced persistent threat group MuddyWater has deployed a Rust-based implant in an ongoing espionage campaign […]

Dobrindt: Mehr Kooperation mit Israel für Sicherheit Deutschlands

Deutschland und Israel haben einen Cyber- und Sicherheitspakt geschlossen. ekavector – shutterstock.com Angesichts der wachsenden Gefahr […]

1 2 3 316