Don't let mistakes bother you

If you don't care, you may become a victim of spam

SentinelLabs uncovers China’s hidden cyber-espionage arsenal

A number of patents have been granted to companies in the People’s Republic of China (PRC) […]

Customer Identity & Access Management: Die besten CIAM-Tools

Wir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt. Jackie […]

How bright are AI agents? Not very, recent reports suggest

Security researchers are adding more weight to a truth that infosec pros had already grasped: AI […]

Attackers wrap phishing links through URL scanning services to bypass detection

Attackers are exploiting the URL wrapping practices of email security services to conceal phishing links and […]

Ransomware up 179%, credential theft up 800%: 2025’s cyber onslaught intensifies

In the first six months of 2025, cybercriminals have already stolen billions of credentials, exploited thousands […]

Cyberkriminelle setzen Ingram Micro Ultimatum

Ransomware-Gangster erpressen Ingram Micro. JHVEPhoto | shutterstock.com Anfang Juli 2025 wurde bekannt, dass der IT-Dienstleister Ingram […]

‘EDR-on-EDR Violence’: Hackers turn security tools against each other

Cybersecurity researchers have uncovered a troubling new attack vector where threat actors are weaponizing free trials […]

Mind the overconfidence gap: CISOs and staff don’t see eye to eye on security posture

CISOs and their security chains of command appear to have significantly divergent views of their organization’s […]

The CSO guide to top security conferences

There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we […]

GenAI als Security-Gamechanger?

Für CISOs bietet generative KI nicht nur eine bloße Arbeitserleichterung, sondern zahlreiche neue Möglichkeiten für die […]

1 2 3 195