
Summer: Why cybersecurity must be strengthened as vacations abound
Summer is a time for vacation and a well-deserved break from the intensity of work. It’s […]

SentinelLabs uncovers China’s hidden cyber-espionage arsenal
A number of patents have been granted to companies in the People’s Republic of China (PRC) […]

Customer Identity & Access Management: Die besten CIAM-Tools
Wir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt. Jackie […]

How bright are AI agents? Not very, recent reports suggest
Security researchers are adding more weight to a truth that infosec pros had already grasped: AI […]

Attackers wrap phishing links through URL scanning services to bypass detection
Attackers are exploiting the URL wrapping practices of email security services to conceal phishing links and […]

Ransomware up 179%, credential theft up 800%: 2025’s cyber onslaught intensifies
In the first six months of 2025, cybercriminals have already stolen billions of credentials, exploited thousands […]

Cyberkriminelle setzen Ingram Micro Ultimatum
Ransomware-Gangster erpressen Ingram Micro. JHVEPhoto | shutterstock.com Anfang Juli 2025 wurde bekannt, dass der IT-Dienstleister Ingram […]

‘EDR-on-EDR Violence’: Hackers turn security tools against each other
Cybersecurity researchers have uncovered a troubling new attack vector where threat actors are weaponizing free trials […]

Mind the overconfidence gap: CISOs and staff don’t see eye to eye on security posture
CISOs and their security chains of command appear to have significantly divergent views of their organization’s […]

The CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we […]