
Silicon under siege: Nation-state hackers target semiconductor supply chains
Cyberattacks targeting the global semiconductor industry surged more than 600% since 2022, with confirmed ransomware losses […]

New ransomware ‘Charon’ uses DLL sideloading to breach critical infrastructure
Trend Micro has identified a new ransomware strain, Charon, which is being deployed in highly targeted […]

Hackers exploit unpatched Erlang/OTP to crack OT firewalls
A max-severity remote code execution (RCE) issue affecting the SSH daemon (sshd) of Erlang’s Open Telecom […]

Deep Packet Inspection vs TCP Analysis: What NDR Brings to the Table
Network security engineers don’t mess around when sophisticated threats target enterprise infrastructure. Yet many security teams […]

Hacker verkaufen Ausweispapiere Zehntausender Italien-Urlauber
Gescannte Reisepässe, Personalausweise und anderen Ausweisdokumente haben Hacker über die Buchungssysteme verschiedener Hotels gestohlen. DC Studio […]
Securing the Semiconductor Supply Chain: 2025 Landscape
In 2025, the semiconductor supply chain in the world is at its most volatile. Having been […]

GPT-5 ist geknackt
Die Grenzen von KI-Modellen lassen sich mit relativ einfachen Mitteln überwinden, wie der Jailbreak von GPT-5 […]

10 most powerful cybersecurity companies today
Geopolitical unrest. Uncertainty about tariffs. A tough regulatory climate. Heightened concerns about AI-generated attacks. Add it […]

Schwachstellen managen: Die besten Vulnerability-Management-Tools
Schwachstellen zu managen, muss keine Schwerstarbeit sein. Wenn Sie die richtigen Tools einsetzen. Das sind die […]

Citrix NetScaler flaw likely has global impact
Attackers are exploiting a Citrix NetScaler vulnerability to breach critical organizations, notably in the Netherlands, but […]