Don't let mistakes bother you

If you don't care, you may become a victim of spam

Google patches third zero-day flaw in Chrome this year

The Google Chrome team issued an update to fix a high-severity vulnerability that is being actively […]

One hacker, many names: Industry collaboration aims to fix cyber threat label chaos

When the same Russian hacking group goes by Midnight Blizzard, Cozy Bear, APT29, or UNC2452, depending […]

Cisco Wireless LAN Controllers under threat again after critical exploit details go public

The heat is back on Wireless LAN Controllers (WLCs) running Cisco IOS XE after technical details […]

The high cost of misconfigured DevOps tools: Global cryptojacking hits enterprises

A massive ongoing cryptojacking operation is actively exploiting misconfigured DevOps tools, including Nomad, Consul, Docker, and […]

53% of cyber department leaders eyeing the exit

Security department heads — those directly reporting to the CISO — are decidedly looking to leave […]

Falschinformationen im Netz werden nur selten erkannt

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2572510425.jpg?quality=50&strip=all 7186w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2572510425.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2572510425.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2572510425.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2572510425.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2572510425.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2572510425.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2572510425.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

AI gives superpowers to BEC attackers

As much as it has been used to defend and make some taxing jobs easier, AI […]

Was ist Federated Identity Management?

Federated Identity optimiert Komfort und Sicherheit auf Kosten der Komplexität. PeachShutterStock | shutterstock.com Im Kern der […]

Threat-Intelligence-Plattformen – ein Kaufratgeber

Threat-Intelligence-Plattformen erleichtern es, Bedrohungen zu durchdringen und wirksame Abwehrmaßnahmen zu ergreifen. specnaz | shutterstock.com Der erste […]

„In der Security geht es vor allem um Resilienz“

srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?quality=50&strip=all 1422w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?resize=640%2C360&quality=50&strip=all 640w, […]

1 2 3 160