A year ago, midsize Japanese logistics company Kantsu suffered significant damage from a cyberattack in which ransomware locked its servers and cut…
Browsing CategoryUncategorized
Passwortfreie Authentifizierung: So gelingt der Umstieg auf PKI
Die zertifikatsbasierte Authentifizierung mit PKI erfolgt via physischen Token statt Passwort. Momentum studio – shutterstock.com Die Bedrohungslage im Cyberraum verschärft sich stetig….
CISOs wollen mehr Datensichtbarkeit
Die meisten CISOs wollen Einsicht in alle Datenströme in ihren Unternehmen, fast immer müssen sie dabei jedoch Kompromisse eingehen. alphaspirit – shutterstock.com…
GitHub Copilot prompt injection flaw leaked sensitive data from private repos
In a new case that showcases how prompt injection can impact AI-assisted tools, researchers have found a way to trick the GitHub…
Unplug Gemini from email and calendars, says cybersecurity firm
CSOs should consider turning off Google Gemini access to employees’ Gmail and Google Calendars, because the chatbot is vulnerable to a form…
Computer mice can eavesdrop on private conversations, researchers discover
High-end computer mice can be used to eavesdrop on the voice conversations of nearby PC users, researchers from the University of California,…
Open-source monitor turns into an off-the-shelf attack beacon
China-affiliated hackers have quietly turned a once-benign open-source network monitoring tool into a remote access beacon. According to new findings from cybersecurity…
Salesforce AI agents set to assist enterprises with security and compliance
Salesforce has announced two new AI agents operating on its Agentforce platform: one agent that monitors activity, detects anomalies, and accelerates investigations…
Autonomous AI hacking and the future of cybersecurity
AI agents are now hacking computers. They’re getting better at all phases of cyberattacks, faster than most of us expected. They can…
10.0-severity RCE flaw puts 60,000 Redis instances at risk
The popular Redis in-memory data store received a patch for a critical vulnerability that leads to remote code execution on the server…