Der Produzent für Bauelemente Heim & Haus ist Opfer einer Cyberattacke. www.heimhaus.de Heim & Haus zählt zu den größten deutschen Produzenten für…
Browsing CategoryUncategorized
Verified, featured, and malicious: RedDirection campaign reveals browser marketplace failures
A widespread browser hijacking campaign has infected over 2.3 million users through 18 malicious extensions available on Google Chrome and Microsoft Edge….
Trend Micro flags BERT: A rapidly growing ransomware threat
A new threat actor, BERT, has emerged as a fast-moving ransomware group that has rapidly expanded its activity across Asia, Europe, and…
IBM Power11 challenges x86 and GPU giants with security-first server strategy
With the launch of Power11 servers, IBM is shifting the discussion from raw performance numbers to security and reliability, highlighting its claim…
Trump seeks unprecedented $1.23 billion cut to federal cyber budget
Donald Trump’s sprawling tax bill, which he signed on July 4, contained a few noteworthy cyber funding items, including $250 million for…
How CISOs are training the next generation of cyber leaders
It’s easy for cybersecurity leaders to get caught up on the day-to-day of making sure teams are delivering and risks are being…
Was ist ein Botnet?
Ein Botnetz besteht aus vielen “Zombie”-Rechnern und lässt sich beispielsweise einsetzen, um DDoS-Attacken zu fahren. Das sollten Sie zum Thema wissen. FOTOKINA…
July Patch Tuesday: 14 critical Microsoft vulnerabilities, one SAP hole rated at 10 in severity
Microsoft’s July Patch Tuesday fixes are a mix of good news and bad news for CSOs: Fourteen of the vulnerabilities are rated…
ClickFix-Attacken bedrohen Unternehmenssicherheit
Cyberkriminelle greifen immer häufiger auf ClickFix-Angriffe zurück. NAJA x -shutterstock.com Weniger bekannt als Phishing ist die Social-Engineering-Methode ClickFix. Ziel solcher Attacken ist…
How a 12-year-old bug in Sudo is still haunting Linux users
Two new vulnerabilities have been found in Sudo, a privileged command-line tool installed on Linux systems, that can allow privilege escalation and…