width=”2490″ height=”1400″ sizes=”(max-width: 2490px) 100vw, 2490px”>Die Gefahr ist noch nicht gebannt: Experten verzeichnen weiter steigende Infektionszahlen. Ascannio – shutterstock.com Deutsche Unternehmen, Behörden…
Browsing CategoryUncategorized
Summer: Why cybersecurity must be strengthened as vacations abound
Summer is a time for vacation and a well-deserved break from the intensity of work. It’s also a great time to be…
SentinelLabs uncovers China’s hidden cyber-espionage arsenal
A number of patents have been granted to companies in the People’s Republic of China (PRC) involving “highly intrusive forensics and data…
Customer Identity & Access Management: Die besten CIAM-Tools
Wir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt. Jackie Niam | shutterstock.com Customer Identity &…
How bright are AI agents? Not very, recent reports suggest
Security researchers are adding more weight to a truth that infosec pros had already grasped: AI agents are not very bright, and…
Attackers wrap phishing links through URL scanning services to bypass detection
Attackers are exploiting the URL wrapping practices of email security services to conceal phishing links and lend credibility to their malicious campaigns….
Ransomware up 179%, credential theft up 800%: 2025’s cyber onslaught intensifies
In the first six months of 2025, cybercriminals have already stolen billions of credentials, exploited thousands of vulnerabilities, and launched record-breaking ransomware…
Cyberkriminelle setzen Ingram Micro Ultimatum
Ransomware-Gangster erpressen Ingram Micro. JHVEPhoto | shutterstock.com Anfang Juli 2025 wurde bekannt, dass der IT-Dienstleister Ingram Micro von einer Ransomware-Attacke betroffen ist….
‘EDR-on-EDR Violence’: Hackers turn security tools against each other
Cybersecurity researchers have uncovered a troubling new attack vector where threat actors are weaponizing free trials of endpoint detection and response (EDR)…
GenAI als Security-Gamechanger?
Für CISOs bietet generative KI nicht nur eine bloße Arbeitserleichterung, sondern zahlreiche neue Möglichkeiten für die Cybersicherheit. SomYuZu – shutterstock.com Durch den…