ISO und ISMS: Darum gehen Security-Zertifizierungen schief
Mit einer ISO 27001-Zertifizierung weisen Unternehmen nach, dass sie ein wirksames Informationssicherheits-Managementsystems (ISMS) betreiben. Lesen Sie, […]
How crooks use IT to enable cargo theft
In the old days, crooks followed transport trucks and hijacked them. Today they use phishing, vishing […]
Crowdstrike cybersecurity report highlights a spike in physical attacks on privileged users
While tracking cyberattacks since last year, a Crowdstrike report also found that physical attacks and kidnappings […]
Cybersecurity experts charged with running BlackCat ransomware operation
Three cybersecurity professionals who specialized in helping companies respond to ransomware attacks have been charged with […]
Louvre delayed Windows security updates ahead of burglary
The Louvre Museum in Paris, victim of an audacious burglary involving a furniture lift last month, […]
New backdoor ‘SesameOp’ abuses OpenAI Assistants API for stealthy C2 operations
In a newly uncovered campaign, threat actors embedded a previously undocumented backdoor, dubbed SesameOp, which exploits […]
Ransomware-Bande missbraucht Microsoft-Zertifikate
Kontinuierlich offenstehende Hintertüren sind für Cyberkriminelle ein Freifahrtschein. Dada Leee | shutterstock.com Die Ransomware-Bande Rhysida ist […]
Modern supply-chain attacks and their real-world impact
When headlines broke this September about the world’s largest supply-chain attack yet on the popular open […]
Gen AI success requires an AI champions network
Getting an enterprise-grade generative AI platform rolled out is a milestone, but it’s just the entry […]
Understanding the Role of Misconfigurations in Data Breaches in Cloud Environments
Key Takeaways Cloud misconfigurations cause 99% of security failures through open storage buckets, excessive IAM permissions, […]