
GPT-5 ist geknackt
Die Grenzen von KI-Modellen lassen sich mit relativ einfachen Mitteln überwinden, wie der Jailbreak von GPT-5 […]

10 most powerful cybersecurity companies today
Geopolitical unrest. Uncertainty about tariffs. A tough regulatory climate. Heightened concerns about AI-generated attacks. Add it […]

Schwachstellen managen: Die besten Vulnerability-Management-Tools
Schwachstellen zu managen, muss keine Schwerstarbeit sein. Wenn Sie die richtigen Tools einsetzen. Das sind die […]

Citrix NetScaler flaw likely has global impact
Attackers are exploiting a Citrix NetScaler vulnerability to breach critical organizations, notably in the Netherlands, but […]

August Patch Tuesday: Authentication hole in Windows Server 2025 now has a fix
A critical zero-day vulnerability in Windows servers running the Kerberos authentication system, first disclosed in May, […]

How to Strengthen Your Corporate Security with Military-Grade Cyber Warfare Tactics?
Every organization faces a threat landscape that evolves as quickly as military battlefields do. By borrowing […]

GPT-5 jailbroken hours after launch using ‘Echo Chamber’ and Storytelling exploit
Just hours after OpenAI dropped GPT-5, the newest brain behind ChatGPT, researchers busted it with a […]

Digitale Souveränität für Deutschland vorerst unerreichbar
BSI-Präsidentin Plattner: “Wir haben technologische Abhängigkeiten an ganz vielen Stellen.” Jan Waßmuth Seine Abhängigkeit von Cloud-Lösungen, […]

5 key takeaways from Black Hat USA 2025
Transformational developments in cybersecurity and agentic AI were front and center during presentations and product announcements […]

9 things CISOs need know about the dark web
The dark web refers to web pages that are not indexed by commonly used search engines. […]