
The Link Between Asset Classification and Threat Response Accuracy
The cybersecurity landscape continues to evolve at an unprecedented pace, with organizations facing increasingly sophisticated threats […]

OAuth-Apps für M365-Phishing missbraucht
Gefälschte OAuth-Apps eröffnen Angreifern neue Wege, um Microsoft-Konten zu kapern. janews – Shutterstock.com Bedrohungsakteure haben einen […]

How ‘Plague’ infiltrated Linux systems without leaving a trace
Security researchers have discovered an unusually evasive Linux backdoor, undetected even by VirusTotal, compromising systems as […]

Ransomware attacks: The evolving extortion threat to US financial institutions
Before sunrise on a chilly November morning, I got the kind of call no security leader […]

CISA releases Thorium, an open-source, scalable platform for malware analysis
The US Cybersecurity and Infrastructure Security Agency (CISA) has released Thorium, a high-throughput open-source platform for […]

MCP: securing the backbone of Agentic AI
The model context protocol (MCP) was only introduced at the end of 2024, but the technological […]
Open Banking: Balancing Innovation & Risk
With the changing needs of customers and the emergence of an increasingly digital financial service industry, […]

CrowdStrike: A new era of cyberthreats from sophisticated threat actors is here
CISOs and their teams are entering a “new era” of cyberthreats characterized by sophisticated threat actors […]

6 things keeping CISOs up at night
CISOs have a lot on their minds, from team’s burn out, AI risks to the pressure […]

Der Kaufratgeber für Breach & Attack Simulation Tools
Breach & Attack Simulation Tools geben Aufschluss darüber, wie gut (oder schlecht) Ihre Sicherheitskontrollen funktionieren. Roman […]