A Chinese-speaking cybercrime group is aggressively targeting vulnerable Internet Information Server (IIS) web servers for use in search engine optimization (SEO) fraud,…
Browsing CategoryUncategorized
Identity Management and Information Security News for the Week of October 3rd: SailPoint, Corsha, Socure, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
That CISO job offer could be a ‘pig-butchering’ scam
The recent experience of a seasoned security leader illustrates how fake job offers are increasingly being used as entry points for “pig-butchering”…
Cl0p-linked threat actors target Oracle E-Business Suite in extortion campaign
Oracle E-Business Suite users beware: Hackers may (or may not) have stolen your sensitive data. Researchers at Halcyon, Google, and Mandiant have…
Red Hat OpenShift AI weakness allows full cluster compromise, warns advisory
Red Hat has updated its OpenShift AI Service after discovering a vulnerability with a CVSS rating of 9.9 that would allow an…
Neue Phishing-Variante greift Gmail-Nutzer an
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?quality=50&strip=all 7008w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2423047525.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Intel- und AMD-Chips physisch angreifbar
Chips von Intel und AMD sind laut Forschern anfällig für physische Cyberattacken. IM Imagery – shutterstock.com Mit „Battering RAM“ und „Wiretrap“ haben…
Disaster recovery and business continuity: How to create an effective plan
The core principles of disaster recovery (DR) and business continuity have remained relatively unchanged for decades: identify risks, conduct a business impact…
10 Kennzahlen, die CISOs weiterbringen
Geht es um Security-Kennzahlen, sollten CISOs sich auf das Wesentliche fokussieren. Foto: Vadym Nechyporenko – shutterstock.com Die Security-Performance zu messen, gehört vielleicht…
That innocent PDF is now a Trojan Horse for Gmail attacks
Enterprise users know by now that they shouldn’t click on suspicious-looking links or download strange files. But what about innocuous, ever-present PDFs?…