
“Crimenetwork” ausgehoben
“Crimenetwork” war für die Betreiber über Jahre ein einträgliches Geschäft. Die finale Abrechnung übernehmen nun die […]

BlackBerry Highlights Rising Software Supply Chain Risks in Malaysia
In 2024, BlackBerry unveiled new proprietary research, underscoring the vulnerability of software supply chains in Malaysia […]

First-ever Linux UEFI bootkit turns out to be student project
Bootkitty, a recently discovered boot-level UEFI rootkit for Linux, was evidently created by students participating in […]

NDR in the Era of Cloud and Hybrid Environments: Why It’s Essential
“The PwC Cybersecurity Outlook Report reveals that 39% of UK senior executives expect cloud-related threats to […]

Möglicher Cyberangriff: IT-Ausfall bei Medion
Zunächst hat Medion einen Cyberangriff als Ursache für den IT-Ausfall genannt. Mittlerweile spricht das Unternehmen “nur” […]

SmokeLoader picks up ancient MS Office bugs to pack fresh credential stealer
Threat actors are using a well-known modular malware loader, SmokeLoader, to exploit known Microsoft Office vulnerabilities […]

EU enacts new laws to strengthen cybersecurity defenses and coordination
The European Union has enacted two new laws to bolster its cybersecurity defenses and coordination mechanisms. […]

10 most critical LLM vulnerabilities
Enterprise adoption of generative AI technologies has exploded in 2024 due to the rapid evolution of […]

Want to be a cybersecurity pro? Use generative AI to get some simulated training
I often get approached by young, ambitious people looking to start a cybersecurity career. Some are […]

Der Weg zum nachhaltigen Cyberschutz
Wenn im Ernstfall Unternehmen stillstehen, sind die Sorgen groß. Mit Cyberresilienz tragen CISOs dazu bei, dass […]