Don't let mistakes bother you

If you don't care, you may become a victim of spam

“Crimenetwork” ausgehoben

“Crimenetwork” war für die Betreiber über Jahre ein einträgliches Geschäft. Die finale Abrechnung übernehmen nun die […]

BlackBerry Highlights Rising Software Supply Chain Risks in Malaysia

In 2024, BlackBerry unveiled new proprietary research, underscoring the vulnerability of software supply chains in Malaysia […]

First-ever Linux UEFI bootkit turns out to be student project

Bootkitty, a recently discovered boot-level UEFI rootkit for Linux, was evidently created by students participating in […]

NDR in the Era of Cloud and Hybrid Environments: Why It’s Essential

“The PwC Cybersecurity Outlook Report reveals that 39% of UK senior executives expect cloud-related threats to […]

Möglicher Cyberangriff: IT-Ausfall bei Medion

Zunächst hat Medion einen Cyberangriff als Ursache für den IT-Ausfall genannt. Mittlerweile spricht das Unternehmen “nur” […]

SmokeLoader picks up ancient MS Office bugs to pack fresh credential stealer

Threat actors are using a well-known modular malware loader, SmokeLoader, to exploit known Microsoft Office vulnerabilities […]

EU enacts new laws to strengthen cybersecurity defenses and coordination

The European Union has enacted two new laws to bolster its cybersecurity defenses and coordination mechanisms. […]

10 most critical LLM vulnerabilities

Enterprise adoption of generative AI technologies has exploded in 2024 due to the rapid evolution of […]

Want to be a cybersecurity pro? Use generative AI to get some simulated training

I often get approached by young, ambitious people looking to start a cybersecurity career. Some are […]

Der Weg zum nachhaltigen Cyberschutz

Wenn im Ernstfall Unternehmen stillstehen, sind die Sorgen groß. Mit Cyberresilienz tragen CISOs dazu bei, dass […]

1 84 85 86 87 88 135