How to Build a DPDP-Ready Data Inventory in 30 Days
The Digital Personal Data Protection Act (DPDP Act) of India has plunged the organisations into a […]
Podcast: Die IT-Tops und -Flops 2025
Die Redaktion von Computerwoche, CIO und CSO sieht das IT-Jahr 2025 mit gemischten Gefühlen zu Ende […]
Iranian APT Prince of Persia returns with new malware and C2 infrastructure
Researchers have discovered new activity from a threat actor dubbed Prince of Persia that’s believed to […]
Top Trends to Expect in Enterprise Cloud Security in 2026
Key Takeaways Enterprise cloud security is shifting from tools, to platform-based solutions that integrate visibility and […]
WatchGuard fixes ‘critical’ zero-day allowing firewall takeover
WatchGuard has issued an urgent patch alert for its Firebox firewall appliances after discovering a critical-rated […]
Attackers bring their own passwords to Cisco and Palo Alto VPNs
Security researchers have flagged a coordinated credential-based campaign targeting VPN authentication endpoints from Cisco and Palo […]
Cisco bestätigt Zero-Day-Exploit für Secure Email
Cisco hat eine Zero-Day-Lücke in seinen Secure-Email-Produkten entdeckt. JarTee – shutterstock.com Cisco Talos hat kürzlich eine […]
Managing agentic AI risk: Lessons from the OWASP Top 10
LLM-powered chatbots have risks that we see playing out in the headlines on a nearly daily […]
Positiv denken für Sicherheitsentscheider: 6 Mindsets, die Sie sofort ablegen sollten
In einem falschen Security-Mindset gefangen? Foto: Paul Craft – shutterstock.com Dass Jobs im Bereich Cybersecurity ein […]
React2Shell is the Log4j moment for front end development
Attackers have upped the ante in their exploits of a recently-disclosed maximum severity vulnerability in React […]