Download the July 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World. aria-label=”Embed of…
Browsing CategoryUncategorized
AI supply chain threats loom — as security practices lag
The AI software supply chain is rapidly expanding to include not only open-source development tools but also collaborative platforms where developers share…
CISOs must rethink defense playbooks as cybercriminals move faster, smarter
Last year nation-state incidents dominated cybersecurity headlines, as Chinese Typhoon threat groups and others made waves across several industries. But throughout the…
PowerShell überwachen – so geht‘s
Wird PowerShell nicht richtig überwacht, ist das Security-Debakel meist nicht weit. rsooll | shutterstock.com Kriminelle Hacker setzen mitunter auf raffinierte Techniken, um…
US DOJ announces progress combatting North Korean remote IT worker schemes
The US Justice Department today announced progress in its battle against Democratic People’s Republic of North Korea (DPRK) workers who have been…
Three steps to boost Amazon S3 data security
The amount of data in modern systems has skyrocketed beyond what traditional security tools can handle. As organizations embrace AI to boost…
Scattered Spider nimmt Luftfahrtbranche ins Visier
Scattered Spider nutzt Social Engineering statt Brute Force um sich Zugang zu verschaffen. VZ_Art – shutterstock.com Die Cybersecurity-Anbieter Mandiant und Palo Alto…
Siloking von Ransomware-Attacke betroffen
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/06/unternehmen-salzburger-strasse_large.jpg?quality=50&strip=all 1977w, https://b2b-contenthub.com/wp-content/uploads/2025/06/unternehmen-salzburger-strasse_large.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/06/unternehmen-salzburger-strasse_large.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/06/unternehmen-salzburger-strasse_large.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/06/unternehmen-salzburger-strasse_large.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/06/unternehmen-salzburger-strasse_large.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/06/unternehmen-salzburger-strasse_large.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/06/unternehmen-salzburger-strasse_large.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/06/unternehmen-salzburger-strasse_large.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/06/unternehmen-salzburger-strasse_large.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″…
Scattered Spider shifts focus to airlines with strikes on Hawaiian and WestJet
Major cybersecurity firms are warning enterprise clients that the notorious Scattered Spider hacking group has shifted its focus to targeting airlines, following…
Patch now: Citrix Bleed 2 vulnerability actively exploited in the wild
Citrix users are back in the crosshairs, as a new out-of-bounds read vulnerability, reminiscent of the notorious “Citrix Bleed,” has surfaced with…