
Hacker greifen über Microsoft-Lücke an
Über eine Sicherheitslücke in SharePoint haben Hacker zahlreiche Behörden und Unternehmen angegriffen. T. Schneider – Shutterstock.com […]

Is AI here to take or redefine your cybersecurity role?
“AI is coming, and will take some jobs, but no need to worry.” That headline ran […]

So geht Tabletop Exercise
Übung macht den Incident-Response-Meister. Foto: GaudiLab – shutterstock.com Die Bedrohungslage entschärft sich bekanntermaßen nie – umso […]

Threat actors scanning for apps incorporating vulnerable Spring Boot tool
Enterprise admins who haven’t yet mitigated a two-month-old vulnerability in apps that incorporate the open source […]

Novel malware from Russia’s APT28 prompts LLMs to create malicious Windows commands
Russian cyberespionage group APT28 has developed malware that generates commands by querying large language models (LLMs). […]

How does Fidelis NDR Delivers Proactive Asset Risk Mitigation?
Organizations operating in sprawling, hybrid IT environments often lack complete visibility into all assets and their […]

Vodafone von Hackerangriff auf Dienstleister betroffen
Ein Dienstleister von Vodafone Deutschland wurde von einem Cyberangriff getroffen. Alexander Fedosov – shutterstock.com Hacker haben […]

Cisco warns of another critical RCE flaw in ISE, urges immediate patching
Cisco has dropped another maximum severity advisory detailing an unauthenticated remote code execution (RCE) flaw in […]

Building scalable secrets management in hybrid cloud environments: Lessons from enterprise adoption
I’ll never forget the morning a few years ago, when a teammate accidentally pushed an AWS […]

Clément Domingo: “We are not using AI correctly to defend ourselves”
Following Kaspersky Horizon on 1 July in Madrid, Clément Domingo, ethical hacker and cybersecurity evangelist, explains […]