
Top US cyber officials face divergent paths after Senate confirmation
Since the start of the Trump administration, the US federal government’s two top cybersecurity leadership positions […]
How Can Deception Technology Fortify Industrial IoT Networks Against Cyber Threats?
Industrial IoT (IIoT) networks are under siege—from ransomware attacks that halt production lines to nation-state actors […]

CISOs beware: genAI use is outpacing security controls
Employees in every organization use an average of 6.6 high-risk generative AI applications – including some […]

Hacker erbeuten Salesforce-Daten mit Vishing
Salesforce-User in mehreren Branchen wurden Opfer einer gezielten Vishing-Attacke. JHVEPhoto – shutterstock.com Eine neue Welle von […]

Outdoor-Shop Unterwegs von Cyberattacke betroffen
Der Händler für Outdoor-Ausrüstung Unterwegs wurde gehackt. Dabei sind möglicherweise Kundendaten abgeflossen. ORIONF – shutterstock.com Der […]

Microsoft launches European Security Program to counter nation-state threats
Microsoft has announced a comprehensive cybersecurity program that will provide free AI-powered defense tools to European […]

Supply chain attack hits RubyGems to steal Telegram API data
An ongoing supply chain attack is targeting the RubyGems ecosystem to publish malicious packages intended to […]

Data hoarding can have financial and security consequences
End-of-life data management, be it deletion of what is no longer required, or data removal from […]

Hackerangriff auf deutschen Pappspezialist Wellteam
126822068 Olivier Le Moal – shutterstock.com Laut einem Bericht der Regionalzeitung Westfalen-Blatt bemerkte die IT von […]

Get out of the audit committee: Why CISOs need dedicated board time
Adequate time with the board is in short supply for CISOs and this restricted engagement is […]