
First-ever Linux UEFI bootkit turns out to be student project
Bootkitty, a recently discovered boot-level UEFI rootkit for Linux, was evidently created by students participating in […]

NDR in the Era of Cloud and Hybrid Environments: Why It’s Essential
“The PwC Cybersecurity Outlook Report reveals that 39% of UK senior executives expect cloud-related threats to […]

Möglicher Cyberangriff: IT-Ausfall bei Medion
Zunächst hat Medion einen Cyberangriff als Ursache für den IT-Ausfall genannt. Mittlerweile spricht das Unternehmen “nur” […]

SmokeLoader picks up ancient MS Office bugs to pack fresh credential stealer
Threat actors are using a well-known modular malware loader, SmokeLoader, to exploit known Microsoft Office vulnerabilities […]

EU enacts new laws to strengthen cybersecurity defenses and coordination
The European Union has enacted two new laws to bolster its cybersecurity defenses and coordination mechanisms. […]

10 most critical LLM vulnerabilities
Enterprise adoption of generative AI technologies has exploded in 2024 due to the rapid evolution of […]

Want to be a cybersecurity pro? Use generative AI to get some simulated training
I often get approached by young, ambitious people looking to start a cybersecurity career. Some are […]

Der Weg zum nachhaltigen Cyberschutz
Wenn im Ernstfall Unternehmen stillstehen, sind die Sorgen groß. Mit Cyberresilienz tragen CISOs dazu bei, dass […]

Why identity security is your best companion for uncharted compliance challenges
In today’s rapidly evolving global regulatory landscape, new technologies, environments, and threats are heightening cybersecurity and […]

Intelligent Privilege Controls™: A quick guide to secure every identity
Security used to be simpler. Employees, servers, and applications were on site. IT admins were the […]