Researchers have observed new cyberespionage campaigns against key organizations from EU-hopefuls Moldova and Georgia using a previously unknown backdoor program and novel…
Browsing CategoryUncategorized
DEF CON research takes aim at ZTNA, calls it a bust
Zero Trust Network Access (ZTNA) has been promoted by vendors over the last several years as a foundational approach for network security….
Critical SSH vulnerabilities expose enterprise network infrastructure as patching lags
The Secure Shell (SSH) protocol serves as the backbone of modern network administration, providing encrypted remote access to virtually every server, network device…
Silicon under siege: Nation-state hackers target semiconductor supply chains
Cyberattacks targeting the global semiconductor industry surged more than 600% since 2022, with confirmed ransomware losses exceeding $1.05 billion since 2018, according…
New ransomware ‘Charon’ uses DLL sideloading to breach critical infrastructure
Trend Micro has identified a new ransomware strain, Charon, which is being deployed in highly targeted attacks against aviation and public sector…
Hackers exploit unpatched Erlang/OTP to crack OT firewalls
A max-severity remote code execution (RCE) issue affecting the SSH daemon (sshd) of Erlang’s Open Telecom Platform (OTP) was exploited by attackers…
Hacker verkaufen Ausweispapiere Zehntausender Italien-Urlauber
Gescannte Reisepässe, Personalausweise und anderen Ausweisdokumente haben Hacker über die Buchungssysteme verschiedener Hotels gestohlen. DC Studio – shutterstock.com Aus italienischen Hotels sind…
GPT-5 ist geknackt
Die Grenzen von KI-Modellen lassen sich mit relativ einfachen Mitteln überwinden, wie der Jailbreak von GPT-5 demonstriert. Nelson Antoine | shutterstock.com Research-Experten…
10 most powerful cybersecurity companies today
Geopolitical unrest. Uncertainty about tariffs. A tough regulatory climate. Heightened concerns about AI-generated attacks. Add it up and you get a high-anxiety,…
Schwachstellen managen: Die besten Vulnerability-Management-Tools
Schwachstellen zu managen, muss keine Schwerstarbeit sein. Wenn Sie die richtigen Tools einsetzen. Das sind die besten in Sachen Vulnerability Management. Foto:…