Microsoft warns of a surge in phishing attacks exploiting email routing gaps
Microsoft’s Threat Intelligence team has disclosed that threat actors are increasingly exploiting complex email routing and […]
8 things CISOs can’t afford to get wrong in 2026
Cybersecurity leaders have a lot to consider when trying to keep their organizations safe. But some […]
Automated data poisoning proposed as a solution for AI theft threat
Researchers have developed a tool that they say can make stolen high-value proprietary data used in […]
Cybersecurity hat kein Budget-Problem
Ein Tag im Leben eines Sicherheitsentscheiders… Dudarau Dzmitry | shutterstock.com Wenn es um Security-Budgets geht, dreht […]
Für Cyberattacken gewappnet – Krisenkommunikation nach Plan
loading=”lazy” width=”400px”>Lesen Sie, welche Aspekte für einen Krisenkommunikationsplan entscheidend sind. Gorodenkoff – shutterstock.com Cyberangriffe fordern nicht […]
Open WebUI bug turns the ‘free model’ into an enterprise backdoor
Security researchers have flagged a high-severity flaw in Open WebUI, a self-hosted enterprise interface for large […]
Privacy-Enhancing Technologies: The New Foundation of Enterprise Data Protection
Over the years, the concept of enterprise data protection strategies has been based on a known […]
Pentesting Is Decision-Making, Not Scanning
Most newcomers to cybersecurity, and even some seasoned professionals, fundamentally misunderstand what a penetration test actually […]
6 strategies for building a high-performance cybersecurity team
Longtime security chief George Gerchow had sought top-notch security engineers and developers to build his team. […]