
Verified, but vulnerable: Malicious extensions exploit IDE trust badges
Developers across popular integrated development environments (IDEs) like Visual Studio Code, Visual Studio, IntelliJ IDEA, and […]

Kritische Schwachstelle in Cisco Unified CM entdeckt
Bereits zum zweiten Mal in einer Woche muss Cisco eine Schwachstelle mit höchsten Schweregrad melden. JarTee […]

Dobrindt will mehr in Cybersicherheit investieren
Bundesinnenminister Alexander Dobrindt will den Schutz vor Cyberangriffen verstärken. hotocosmos1 – shutterstock.com Bundesinnenminister Alexander Dobrindt (CSU) […]

Cybersecurity in the supply chain: strategies for managing fourth-party risks
Fourth-party vendors have become a serious supply chain cybersecurity blind spot. Unlike third parties with direct […]

Security-KPIs und -KRIs: So messen Sie Cybersicherheit
Cybersicherheit zu messen, ist kein Kinderspiel. Foto: Ultraskrip – shutterstock.com Eine wichtige Säule jedes ausgereiften Cyberrisk-Programms […]

Hunters International shuts ransomware operations, reportedly becomes an extortion-only gang
Ransomware gang Hunters International says it’s shutting down its operations for unexplained reasons, and is offering […]

Endpoint Vulnerability Remediation: From Alert to Action Using EDR Tools
With the boom of cloud usage and AI, organizations have been facing an increase in cybersecurity […]

Hardcoded root credentials in Cisco Unified CM trigger max-severity alert
Cisco (Nasdaq:CSCO) has patched a max severity flaw in its Unified Communications Manager (Unified CM) and […]

Erneute Cyberattacke auf Internationalen Strafgerichtshof
Der Internationale Strafgerichtshof wurde bereists zum zweiten Mal von einer Cyberattacke getroffen. Nominesine – shutterstock.com Der […]
Why Compliance Alone Isn’t Enough: CryptoBind’s Vision
Compliance to industry standards and regulations is frequently considered the gold standard for data security in […]