Die Ransomware-Bande Akira hat die Versicherungsgruppe Ideal angegriffen. Who is Danny – shutterstock.com Auf seiner Webseite informiert das Versicherungsunternehmen Ideal aktuell über…
Browsing CategoryUncategorized
No more orange juice? Why one ship reveals America’s maritime cybersecurity crisis
A single vessel called the Orange Star docks at Port Elizabeth in New Jersey, carrying 38,848 cubic meters of orange juice concentrate….
CISA orders immediate patching as GeoServer flaw faces active exploitation
CISA is sounding the alarm over a critical vulnerability in GeoServer that is being actively exploited in the wild, ordering federal agencies…
Microsoft stellt neue Sicherheitsstrategie vor
Microsoft hat angekündigt, dass sein Bug-Bounty-Programm ausgeweitet werden soll. bluestork – shutterstock.com Cyberangriffe beschränken sich heutzutage nicht auf bestimmte Unternehmen, Produkte oder…
Cybersecurity leaders’ top seven takeaways from 2025
Over the last 12 months, security teams continued to walk a tightrope between moving fast to adopt new technologies and facing escalating…
Microsoft flips security script: ‘In scope by default’ makes all vulnerabilities fair game for bug bounties
Today’s AI-enabled attackers are agnostic: They’re not limiting themselves to specific companies, products, or services — they’re going where the vulnerabilities are….
Leaked Home Depot credential exposed internal systems for a year
Home Depot exposed access to internal systems for a year, TechCrunch reports. According to security researcher Ben Zimmermann, a Home Depot employee published…
Gladinet servers file-sharing servers allow remote code execution
Enterprises relying on Gladinet’s file-sharing services are faced with another round of zero-day patching, this time to block attackers from abusing cryptographic…
Identity Management and Information Security News for the Week of December 12th: Commvault, Saviynt, Outpost24, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
Zero-Trust-Umsetzung: Die richtige Kommunikation zählt
Möchten CISOs neue Strategien wie Zero Trust einführen, ist die richtige Kommunikation entscheidend. HZ Creations – shutterstock.com Die Umsetzung großer Transformationsinitiativen, wie…