
New botnet hijacks AI-powered security tool on Asus routers
A newly uncovered botnet is targeting Asus routers — specifically models RT-AC3100 and RT-AC3200 — to […]

Mastering SQL Injection Recon – Step-by-Step Guide for Bug Bounty Hunters
Picture this: You’re testing a website, and with a simple tweak to a login form—BAM!—you trick […]

Hackerangriff auf Arcona Hotels
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?quality=50&strip=all 1742w, https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?resize=854%2C480&quality=50&strip=all 854w, […]

Novel PumaBot slips into IoT surveillance with stealthy SSH break-ins
Security researchers are warning about a novel Linux botnet, dubbed PumaBot, targeting Internet of Things (IOT) […]

Void Blizzard nimmt NATO-Organisationen ins Visier
Russische Hacker ändern ihre Taktik von Passwort-Spraying zu Phishing, aber ihre Ziele innerhalb der NATO bleiben […]

Passwortlose Authentifizierung wird für CISOs immer wichtiger
Selbst MFA ist vor raffinierten, KI-gesteuerten Phishing-Angriffen nicht sicher. Biometrische Verfahren gelten als vielversprechende Alternative. CC7 […]

Hackerangriff auf Außenministerium alarmiert Nato und EU
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2420504331.jpg?quality=50&strip=all 4997w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2420504331.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2420504331.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2420504331.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2420504331.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2420504331.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2420504331.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/05/shutterstock_2420504331.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

Securing Windows 11 and Server 2025: What CISOs should know about the latest updates
Windows 11 24H2 and Server 2025 are rolling out new features and enhancements — some of […]

The CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we […]

Warning: Threat actors now abusing Google Apps Script in phishing attacks
Threat actors have discovered a way to abuse Google Apps Scripts to sneak links to malicious […]