
Dobrindt prüft Einsatz von US-Software Palantir
Kann sich den Einsatz von Palantir vorstellen: Bundesinnenminister Dobrindt hotocosmos1 – shutterstock.com Bundesinnenminister Alexander Dobrindt (CSU) […]

Ransomware upstart Gunra goes cross-platform with encryption upgrades
A new Linux variant of the “Gunra” ransomware family has been identified with highly configurable multithreading, […]

Palo Alto Networks eyes $20B CyberArk deal as identity security takes center stage
Palo Alto Networks is closing in on what could be its biggest bet yet: a more […]

Breaking Down Credential Phishing Trends: How Can NDR Help?
Cybercriminals have changed tactics. Credential phishing has overtaken ransomware as the most common way to breach […]

Prepping for the quantum threat requires a phased approach to crypto agility
Enterprises need to act now to address the threats future quantum computing advances pose to current […]

How CISOs can scale down without compromising security
Years ago, David Mahdi, now a CISO advisor at Transmit Security, found himself in a situation […]

MCP‑Sicherheit: Das Rückgrat von Agentic AI sichern
Im Zuge von Agentic AI sollten sich CISOs mit MCP-Sicherheit auseinandersetzen. Wanan Wanan – shutterstock.com Das […]

Google patches Gemini CLI tool after prompt injection flaw uncovered
It’s barely been out for a month and already security researchers have discovered a prompt injection […]

From Asset Profile to Response: How Fidelis Accelerates MTTR
In cybersecurity, time isn’t just money, it’s everything. The longer it takes to detect and respond […]

Auto-Color RAT targets SAP NetWeaver bug in an advanced cyberattack
Threat actors recently tried to exploit a freshly patched max-severity SAP Netweaver flaw to deploy a […]