
DeepSeek leaks one million sensitive records in a major data breach
A New York-based cybersecurity firm, Wiz, has uncovered a critical security lapse at DeepSeek, a rising […]

FBI takes down Cracked.to and Nulled.to in a global law enforcement operation
FBI has taken down Cracked.to, Nulled.to, and a few other hack sites cybercriminals use for dropping […]

What is Magecart? How this hacker group steals payment card data
Magecart definition Magecart is a consortium of malicious hacker groups who target online shopping cart systems, […]

American CISOs should prepare now for the coming connected-vehicle tech bans
In a groundbreaking shift in automotive supply chain regulation, the White House announced a new rule […]

5 teure Threat-Intelligence-Fehler
Fehlgeleitete Threat-Intelligence-Programme lassen (nicht nur) Ihr Security-Budget schmelzen. Vitalii Stock | shutterstock.com Ausgeprägte Fähigkeiten im Bereich […]

New Mirai botnet fires off DDoS attacks via compromised Mitel phones, notifies command & control when detected
A third variant of the Mirai-based Aquabot malware is apparently taking over Mitel phones to create […]

Threat actors using Google Gemini to amplify attacks: Report
Government-backed threat actors are currently using Google’s Gemini AI service to expand their capabilities, part of […]

Breaking Down Signature-Based Detection: A Practical Guide
Nearly 90% of cyberattacks are known methods that proper systems can detect, but most organizations don’t […]

Ransomware: Schwere Versäumnisse in deutschen Unternehmen
Laut einer Umfrage benötigen deutsche Unternehmen im Vergleich zu anderen Ländern mehr Zeit und Geld, um […]

Download our security information and event management (SIEM) tools buyer’s guide
From the editors of CSO, this enterprise buyer’s guide helps IT security staff understand what SIEM […]