The Cybersecurity and Infrastructure Security Agency and the MITRE Corporation have renegotiated the contract supporting the 26-year-old Common Vulnerabilities and Exposures Program…
Browsing CategoryUncategorized
OpenAI says Codex Security found 11,000 high-impact bugs in a month
OpenAI’s new AppSec agent, Codex Security, has already flagged over 11,000 high-severity and critical flaws in real-world codebases during its first 30…
NIS-2: Tausende reißen BSI-Frist und riskieren Strafen
Das deutsche Gesetz zur Umsetzung der NIS-2-Richtlinie ist am 6. Dezember 2025 in Kraft getreten. konstakorhonen – shutterstock.com Welche Auswirkungen IT-Sicherheitsvorfälle für…
Rogues gallery: 15 worst ransomware groups active today
Ransomware-as-a-service (RaaS) models, double extortion tactics, and increasing adoption of AI characterize the evolving ransomware threat landscape. Law enforcement takedowns of groups…
4 ways to prepare your SOC for agentic AI
a way to automate alert triage, threat investigation and eventually higher-level functions. According to IDC, agentic AI is on track to become…
PQC roadmap remains hazy as vendors race for early advantage
Post-quantum cryptography (PQC) has long sat on the periphery of enterprise security, with experts calling it inevitable but not urgent. That posture…
Tarnung als Taktik: Warum Ransomware-Angriffe raffinierter werden
Statt eines kurzen, aber sehr schmerzhaften Stiches setzen Cyberkrimelle zunehmend darauf, sich in ihren Opfern festzubeißen und beständig auszusaugen. mycteria – shutterstock.com…
Identity Management and Information Security News for the Week of March 6th: Delinea, Mimecast, Predactiv, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
From Visibility to Action: Where the Leverage Lives in Modern Security Operations
Ivan Dwyer, a Senior Product Marketing Strategist at Axonius, examines where the leverage lives in modern security operations. This article originally appeared…
Trump’s cyber strategy emphasizes offensive operations, deregulation, AI
The White House released President Donald Trump’s long-awaited cybersecurity strategy, a lean seven-page blueprint that breaks from past approaches by placing offensive…