Don't let mistakes bother you

If you don't care, you may become a victim of spam

Bug bounty programs can deliver significant benefits, but only if you’re ready

Bug bounty programs, which offer financial incentives to outside security researchers to find software vulnerabilities, seem […]

Salt Typhoon poses a serious supply chain risk to most organizations

In the late spring of 2024, the US Federal Bureau of Investigation (FBI) began investigating reports […]

ISO und ISMS: Darum gehen Security-Zertifizierungen schief

Mit einer ISO 27001-Zertifizierung weisen Unternehmen nach, dass sie ein wirksames Informationssicherheits-Managementsystems (ISMS) betreiben. Lesen Sie, […]

US sanctions Chinese cybersecurity firm over global malware campaign

The US government has imposed sanctions on Chinese cybersecurity firm Sichuan Silence Information Technology and one […]

Romanian energy supplier Electrica hit by ransomware

First, the Romanian presidential election was annulled after being targeted with cyberattacks from foreign state-sponsored actors and […]

Black Hat Europe preview: Cryptographic protocol attacks and AI in the spotlight

This week in London Black Hat Europe will feature a diverse range of talks and presentations […]

The Economics of XDR: Reducing Costs and Enhancing Efficiency

As cyber threats get trickier—with ransomware attacks happening every 11 seconds, and each attack costing between […]

Termite-Bande bekennt sich zu Blue Yonder-Hack

Die Ransomware-Bande Termite ist offenbar für den Hackerangriff auf den SaaS-Anbieter Blue Yonder verantwortlich. DC Studio […]

AWS customers face massive breach amid alleged ShinyHunters regroup

Terabytes of data belonging to thousands of AWS customers, including customer details, AWS credentials, and proprietary […]

Zukunft schenken und die Hacker School unterstützen

Mitmachen und Zukunft schenken. In einer Zeit, in der IT-Technik und digitale Tools alle Facetten unseres […]

1 79 80 81 82 83 135