
Spotlight report: How AI is reshaping IT
Download the August 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]

Wie EDR EDR aushebelt
Legitime Security-Tools gegeneinander auszuspielen, eröffnet Cyberkriminellen diverse Vorteile. Tero Vesalainen | shutterstock.com Cybersicherheitsforscher haben einen unheilvollen […]

Microsoft-Sicherheitslücke in Deutschland weit verbreitet
width=”2490″ height=”1400″ sizes=”(max-width: 2490px) 100vw, 2490px”>Die Gefahr ist noch nicht gebannt: Experten verzeichnen weiter steigende Infektionszahlen. […]

Summer: Why cybersecurity must be strengthened as vacations abound
Summer is a time for vacation and a well-deserved break from the intensity of work. It’s […]

SentinelLabs uncovers China’s hidden cyber-espionage arsenal
A number of patents have been granted to companies in the People’s Republic of China (PRC) […]

Customer Identity & Access Management: Die besten CIAM-Tools
Wir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt. Jackie […]

How bright are AI agents? Not very, recent reports suggest
Security researchers are adding more weight to a truth that infosec pros had already grasped: AI […]

Attackers wrap phishing links through URL scanning services to bypass detection
Attackers are exploiting the URL wrapping practices of email security services to conceal phishing links and […]

Ransomware up 179%, credential theft up 800%: 2025’s cyber onslaught intensifies
In the first six months of 2025, cybercriminals have already stolen billions of credentials, exploited thousands […]

Cyberkriminelle setzen Ingram Micro Ultimatum
Ransomware-Gangster erpressen Ingram Micro. JHVEPhoto | shutterstock.com Anfang Juli 2025 wurde bekannt, dass der IT-Dienstleister Ingram […]