Top cyber threats to your AI systems and infrastructure
Attacks against AI systems and infrastructure are beginning to take shape in real-world instances, and security […]
Die wichtigsten CISO-Trends für 2026
Lesen Sie, vor welchen Herausforderungen CISOs mit Blick auf das Jahr 2026 stehen. SuPatMaN – shutterstock.com […]
Holes in Veeam Backup suite allow remote code execution, creation of malicious backup config files
Veeam says that four vulnerabilities could allow a person with certain oversight roles for its flagship […]
Critical RCE flaw allows full takeover of n8n AI workflow platform
Researchers have released details about a critical vulnerability that was silently patched in n8n, a platform […]
Bug in Open WebUI macht Kostenlos-Tool zur Backdoor
Der Schweregrad des Bugs in Open WebUI wird als hoch eingestuft. Wirestock Creators- shutterstock.com Sicherheitsforschende von […]
Neue Ransomware-Bedrohung zielt auf deutsche Unternehmen
Der Ransomware-Dienst Ransomhouse nutzt jetzt eine komplexe Dual-Schlüssel-Verschlüsselung und automatisierte Angriffe auf VMware ESXi. Suttipun – […]
How to eliminate IT blind spots in the modern, AI-driven enterprise
The more organizations lean on artificial intelligence (AI), spread workloads across different environments, and tie systems […]
Microsoft warns of a surge in phishing attacks exploiting email routing gaps
Microsoft’s Threat Intelligence team has disclosed that threat actors are increasingly exploiting complex email routing and […]
8 things CISOs can’t afford to get wrong in 2026
Cybersecurity leaders have a lot to consider when trying to keep their organizations safe. But some […]
Automated data poisoning proposed as a solution for AI theft threat
Researchers have developed a tool that they say can make stolen high-value proprietary data used in […]