The Council of Europe has authorized the European Commission and member states to sign the United Nations Convention against Cybercrime. The international…
Browsing CategoryUncategorized
Gladinet file sharing zero-day brings patched flaw back from the dead
Criminals have been spotted exploiting a new zero-day vulnerability in Gladinet CentreStack and Triofox file sharing servers that could allow them to…
Aisuru’s 30 Tbps botnet traffic crashes through major US ISPs
A newly disclosed attack campaign linked to the IoT botnet Aisuru led to a massive surge in malicious traffic, temporarily disrupting major…
AI red flags, ethics boards and the real threat of AGI today
Paul Dongha is head of responsible AI and AI strategy at NatWest Group, where he leads the development of frameworks to ensure…
Hacker nutzen 100.000 IP-Adressen für RDP-Angriffe
Eine großangelegte Botnet-Kampagne zielt auf Remote-Desktop-Protocol-Anwender. Profit_Image – shutterstock.com Forscher des Security-Anbieters GreyNoise entdeckten kürzlich eine massive Angriffswelle, die von mehr als…
Dull but dangerous: A guide to 15 overlooked cybersecurity blind spots
Resilience fails in the seams: tiny misconfigurations, forgotten defaults and silent drifts that escape the spotlight but magnify blast radius when things…
Daten von Millionen Qantas-Kunden öffentlich
Anfang Juli wurden Millionen Kundendaten bei Qantas gestohlen. Berichten zufolge haben die Täter die Daten nun veröffentlicht. T. Schneider – shutterstock.com Rund…
What to look for in a data protection platform for hybrid clouds
Data protection is a broad category that includes data security but also encompasses backup and disaster recovery, safe data storage, business continuity…
CIO100 and CSO30 ASEAN 2025 Team Awards Finalists: Celebrating Technology and Cybersecurity Excellence Across the Southeast Asia region
SINGAPORE, October 13, 2025 Singapore’s premier technology leadership awards recognize groundbreaking innovations and transformative achievements ahead of spectacular Gala Night celebration. CIO…
So schützen Zugriffskontrollen vor Ransomware
loading=”lazy” width=”400px”>Um sich vor Ransomware-Angriffen zu schützen, sollten Unternehmen ihre Logins absichern. Fit Ztudio – shutterstock.com Ransomware bleibt eine der größten Gefahren…