
25 on 2025: APAC security thought leaders share their predictions and aspirations
As threat actors and security teams harness the growing potential of artificial intelligence (AI), who will […]

45 Schulen von Cyberangriff betroffen
Bei einer Cyberattacke auf einen IT-Dienstleister wurden mehrere Schulserver verschlüsselt. Elena Uve – Shutterstock.com Die Kreisverwaltung […]

Spooks of the internet came alive this Halloween
Halloween 2024 made history with a massive spike in distributed denial of service (DDoS) attacks, with […]

Beko Technologies bestätigt Ransomware-Angriff
srcset=”https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2491655697.jpg?quality=50&strip=all 7360w, https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2491655697.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2491655697.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2491655697.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2491655697.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2491655697.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2491655697.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2491655697.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

Security chiefs whose companies operate in the EU should be exploring DORA now
If your enterprise operates in Europe, you should care about the Digital Operational Resilience Act (DORA), […]

Cybersecurity is tough: 4 steps leaders can take now to reduce team burnout
Working in cybersecurity is only getting harder. Cybercriminals continue to up their game as security teams […]

Microsoft Teams vishing attacks trick employees into handing over remote access
Attackers believed to be affiliated with ransomware groups have recently been observed using a technique in […]
Mastering Network Traffic Pattern Analysis for Enhanced Performance
Analyzing network traffic patterns is the heart of a successful security strategy. As organizations continue to […]

ChatGPT-Lücke ermöglicht DDoS-Attacken
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2560810077.jpg?quality=50&strip=all 3696w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2560810077.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2560810077.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2560810077.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2560810077.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2560810077.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2560810077.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/01/shutterstock_2560810077.jpg?resize=150%2C84&quality=50&strip=all 150w, […]

ChatGPT API flaws could allow DDoS, prompt injection attacks
OpenAI-owned ChatGPT might have a vulnerability that could allow threat actors to launch distributed denial of […]