
CrowdStrike: A new era of cyberthreats from sophisticated threat actors is here
CISOs and their teams are entering a “new era” of cyberthreats characterized by sophisticated threat actors […]

6 things keeping CISOs up at night
CISOs have a lot on their minds, from team’s burn out, AI risks to the pressure […]

Der Kaufratgeber für Breach & Attack Simulation Tools
Breach & Attack Simulation Tools geben Aufschluss darüber, wie gut (oder schlecht) Ihre Sicherheitskontrollen funktionieren. Roman […]

How NDR Identifies Malware Through Traffic Analysis Patterns and Behaviors
Massive volumes of network traffic flow across your environment every second, and traditional security tools can […]

Cybercrooks faked Microsoft OAuth apps for MFA phishing
Threat actors have cooked up a clever way to slip past multifactor authentication (MFA), tricking users […]

Spotlight report: How AI is reshaping IT
Download the August 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]

Wie EDR EDR aushebelt
Legitime Security-Tools gegeneinander auszuspielen, eröffnet Cyberkriminellen diverse Vorteile. Tero Vesalainen | shutterstock.com Cybersicherheitsforscher haben einen unheilvollen […]

Microsoft-Sicherheitslücke in Deutschland weit verbreitet
width=”2490″ height=”1400″ sizes=”(max-width: 2490px) 100vw, 2490px”>Die Gefahr ist noch nicht gebannt: Experten verzeichnen weiter steigende Infektionszahlen. […]

Summer: Why cybersecurity must be strengthened as vacations abound
Summer is a time for vacation and a well-deserved break from the intensity of work. It’s […]

SentinelLabs uncovers China’s hidden cyber-espionage arsenal
A number of patents have been granted to companies in the People’s Republic of China (PRC) […]