
7 Security-Praktiken zum Abgewöhnen
Aus der Zeit gefallen? Sergio Delle Vedove | shutterstock.com Schlechte Angewohnheiten abzustellen (oder bessere zu entwickeln), […]

White House AI plan heavy on cyber, light on implementation
The White House released an AI plan chock-full of cybersecurity provisions among what the White House […]

Clorox sues Cognizant for $380M over alleged helpdesk failures in cyberattack
US bleach and cleaning product giant Clorox has filed a $380 million lawsuit against IT services […]

Interlock ransomware threat expands across the US and Europe, hits healthcare and smart cities
The FBI, CISA, Department of Health and Human Services (HHS), and the Multi-State Information Sharing and […]

Cyberattacke auf SWMH-Mediengruppe
Die Südwestdeutsche Medienholding (SWMH) wurde gehackt. Aller Verlagshäuser sind betroffen. MacroEcon – shutterstock.com Die Südwestdeutsche Medienholding […]

Top 10 MCP vulnerabilities: The hidden risks of AI integrations
Model context protocol (MCP) is quickly growing in popularity as a means for enabling AI assistants […]

Hacker aus China nutzen neue Sharepoint-Lücke aus
Microsoft hat drei chinesische Hackergruppen identifiziert, die für die Angriffe über die Sicherheitslücke in SharePoint verantwortlich […]

What Makes an Asset Risk Assessment Effective in a Threat-Driven World?
Industry experts with over a decade of cybersecurity experience recognize that the old ways of doing […]

Die besten DAST- & SAST-Tools
Tools für Dynamic und Static Application Security Testing helfen Entwicklern, ihren Quellcode zu härten. Wir zeigen […]

Warning to feds: US infrastructure is under silent attack
Threat actors have become craftier as they increasingly target critical infrastructure, including operational technology (OT) environments […]