JumpCloud agent turns uninstall into a system shortcut
JumpCloud’s Remote Assist for Windows agent contained a critical local privilege escalation flaw, allowing full system […]
Russische APT-Gruppe greift westliche KRITIS-Betreiber an
Eine russische Cyberspionage-Kampagne zielt auf Energieversorger. Evgeny_V – shutterstock.com Das Team von Amazon Threat Intelligence stellte […]
Telekom startet System gegen Betrugsanrufe
Der Call Check der Deutschen Telekom soll Smartphone-Kunden künftig vor betrügerischen Anrufen schützen. Sandwish Studio – […]
The devil of proposed SEC AI disclosure rule is in the details
A US Securities and Exchange Commission committee has recommended a new rule that would mandate companies […]
CASB buyer’s guide: What to know about cloud access security brokers before you buy
Cloud access security brokers (CASBs) explained As the name suggests, a cloud access security broker (CASB) […]
Continuous Monitoring for Cloud Protection: Best Practices for Saudi Compliance
The process of cloud adoption in Saudi Arabia is on a fast track as the nation […]
User-Experience-Irrwege: 5 Fehler, die Ihre Sicherheit gefährden
Übermäßig komplexe, unnötige oder unsinnige Sicherheitsmaßnahmen können Mitarbeiter nachhaltig frustrieren. Das schafft neue Risiken. Foto: vchal […]
FortiGate firewall credentials being stolen after vulnerabilities discovered
Threat actors aren’t wasting time taking advantage of newly-revealed vulnerabilities in Fortinet device authentication. Researchers at […]
Russian APT group pivots to network edge device misconfigurations
A Russian state-sponsored cyberespionage group has been targeting energy companies and critical infrastructure providers by exploiting […]
Demystifying risk in AI
Given the facts about the importance of Artificial Intelligence, for several months, I have been delving […]