Don't let mistakes bother you

If you don't care, you may become a victim of spam

What it takes to win that CSO role

CSO and CISO roles are among the hardest to fill in IT. Which should be good […]

ClickFix techniques evolve in new infostealer campaigns

Cybercriminals are combining compromised websites with increasingly sophisticated ClickFix social engineering lures to deliver new infostealer […]

GenAI-Security als Checkliste

Das Open Web Application Security Project (OWASP) gibt Unternehmen eine Checkliste für (mehr) GenAI-Sicherheit an die […]

Google warns of two actively exploited Chrome zero days

Threat actors are exploiting two high severity zero day vulnerabilities in the Chrome browser that experts […]

Cyber criminals too are working from home… your home

The FBI is so concerned about the threat of residential proxy attacks and the dangers posed […]

Veeam warns admins to patch now as critical RCE flaws hit Backup & Replication

Backup vendor Veeam has released security updates to patch multiple vulnerabilities in its widely used Backup […]

Hybrid resilience: Designing incident response across on-prem, cloud and SaaS without losing your mind

I used to think hybrid incidents would get easier once we standardized on “one tool”: one […]

Storm-2561 targets enterprise VPN users with SEO poisoning, fake clients

Microsoft has warned enterprises that cybercriminal group Storm-2561 is hijacking search engine results to serve trojanized […]

The cyber perimeter was never dead. We just abandoned it.

Industry has comforted itself with the idea that the perimeter is dead. It is not. What […]

10 Kennzahlen, die CISOs weiterbringen

Geht es um Security-Kennzahlen, sollten CISOs sich auf das Wesentliche fokussieren. Foto: Vadym Nechyporenko – shutterstock.com […]

1 2 3 363