Top 10 vendors for AI-enabled security — according to CISOs
Venture capital may be flowing to trendy AI security startups, but battle-tested CISOs seem to be […]
The Real Cost of a Data Breach: Why Data Protection Is Now a Boardroom Priority
Organizations will start and possibly end with regulatory fines when discussing the cost of data breach. Although the fines […]
Notorious BreachForums hacking site hit by ‘doomsday’ leak of 324,000 criminal users
Prominent crime forum BreachForums has suffered a new and possibly fatal blow to its reputation after […]
Shai-Hulud & Co.: Die Supply Chain als Achillesferse
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?quality=50&strip=all 4096w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=150%2C84&quality=50&strip=all 150w, […]
Malicious npm packages target the n8n automation platform in a supply chain attack
Threat actors were spotted weaponizing the n8n automation ecosystem this week, slipping malicious npm packages into […]
Iran-linked MuddyWater APT deploys Rust-based implant in latest campaign
Iran-linked advanced persistent threat group MuddyWater has deployed a Rust-based implant in an ongoing espionage campaign […]
Dobrindt: Mehr Kooperation mit Israel für Sicherheit Deutschlands
Deutschland und Israel haben einen Cyber- und Sicherheitspakt geschlossen. ekavector – shutterstock.com Angesichts der wachsenden Gefahr […]
CISOs’ top 10 cybersecurity priorities for 2026
Cybersecurity threats are becoming more sophisticated, more automated, and more intelligent, as well as harder to […]
2025-2026 Roadmap: Maintaining Continuous Data Protection Compliance
As companies continue with their digital transformation processes, the pressure to maintain constant compliance with data […]
SBOM erklärt: Was ist eine Software Bill of Materials?
Softwareentwicklung und Autoproduktion haben mehr gemein, als man denkt. Lesen Sie, was Sie zum Thema Software […]