From credentials to cloud admin in 8 minutes: AI supercharges AWS attack chain
Threat actors tore through an Amazon Web Services environment in under eight minutes, chaining together credential […]
Notepad++ infrastructure hijacked by Chinese APT in sophisticated supply chain attack
The popular open-source text editor Notepad++ was targeted in a sophisticated supply chain attack that allowed […]
Think agentic AI is hard to secure today? Just wait a few months
Early experimentation with agentic AI has given CISOs a preview of the possible cybersecurity nightmares ahead. […]
Shai-Hulud & Co.: The software supply chain as Achilles’ heel
Today’s applications are based on numerous components, each of which, along with the development environments themselves, […]
Was tun, wenn die Erpresser kommen?
Ruhe bewahren und keine übereilten Sachen machen, empfiehlt Podcast-Gast Joanna Lang-Recht. intersoft consulting services AG Montagmorgen, […]
90-Day DPDP Readiness Plan for Indian Enterprises
The Digital Personal Data Protection (DPDP) Act of India is one of the most significant regulatory […]
New phishing attack leverages PDFs and Dropbox
Even as they become ever more stealthy with AI-driven tools, threat actors are not giving up […]
Microsoft disables NTLM in Windows
Microsoft has announced that the phase-out of NT LAN Manager (NTLM) is now transitioning to disabling […]
Human Risk Management: Das Paradoxon der Sicherheitsschulungen
Security Awareness Trainings sollten auf dem Human-Risk-Management-Ansatz basieren. FAMILY STOCK – shutterstock.com Unternehmen investieren Millionen von […]
How risk culture turns cyber teams predictive
The first time you’ll hear, “We’re always in incident mode,” it won’t be said with drama. […]