Ransomware-Banden erpressen Opfer mit Compliance-Verstößen
Ransomware-Gruppen setzen ihre Opfer vermehrt mit Compliance-Verstößen unter Druck. Digitala World – shutterstock.com Ransomware-Attacken zählen nach […]
High-severity bug in Broadcom software enables easy WiFi denial-of-service
A high-severity flaw in Broadcom WiFi chipset software can allow an attacker within radio range to […]
For application security: SCA, SAST, DAST and MAST. What next?
I have stared at enough scanner dashboards to recognize the pattern. SAST flags theoretical flaws that […]
Top 10 vendors for AI-enabled security — according to CISOs
Venture capital may be flowing to trendy AI security startups, but battle-tested CISOs seem to be […]
The Real Cost of a Data Breach: Why Data Protection Is Now a Boardroom Priority
Organizations will start and possibly end with regulatory fines when discussing the cost of data breach. Although the fines […]
Notorious BreachForums hacking site hit by ‘doomsday’ leak of 324,000 criminal users
Prominent crime forum BreachForums has suffered a new and possibly fatal blow to its reputation after […]
Shai-Hulud & Co.: Die Supply Chain als Achillesferse
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?quality=50&strip=all 4096w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=150%2C84&quality=50&strip=all 150w, […]
Malicious npm packages target the n8n automation platform in a supply chain attack
Threat actors were spotted weaponizing the n8n automation ecosystem this week, slipping malicious npm packages into […]
Iran-linked MuddyWater APT deploys Rust-based implant in latest campaign
Iran-linked advanced persistent threat group MuddyWater has deployed a Rust-based implant in an ongoing espionage campaign […]
Dobrindt: Mehr Kooperation mit Israel für Sicherheit Deutschlands
Deutschland und Israel haben einen Cyber- und Sicherheitspakt geschlossen. ekavector – shutterstock.com Angesichts der wachsenden Gefahr […]