At a time when AI-powered cyber threats and sophisticated state-backed hacking groups dominate the headlines, the lack of elementary security continues to…
Browsing CategoryUncategorized
Hacker greifen über Microsoft-Lücke an
Über eine Sicherheitslücke in SharePoint haben Hacker zahlreiche Behörden und Unternehmen angegriffen. T. Schneider – Shutterstock.com IT-Sicherheitsexperten schlagen Alarm, weil Behörden und…
Is AI here to take or redefine your cybersecurity role?
“AI is coming, and will take some jobs, but no need to worry.” That headline ran atop a CSO story published in…
So geht Tabletop Exercise
Übung macht den Incident-Response-Meister. Foto: GaudiLab – shutterstock.com Die Bedrohungslage entschärft sich bekanntermaßen nie – umso wichtiger ist es, dass Sicherheitsentscheider und…
Threat actors scanning for apps incorporating vulnerable Spring Boot tool
Enterprise admins who haven’t yet mitigated a two-month-old vulnerability in apps that incorporate the open source Spring Boot tool could be in…
Novel malware from Russia’s APT28 prompts LLMs to create malicious Windows commands
Russian cyberespionage group APT28 has developed malware that generates commands by querying large language models (LLMs). The malware, dubbed LAMEHUG by the…
Identity Management and Information Security News for the Week of July 18th: KnowBe4, SentinelOne, Okta, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
Vodafone von Hackerangriff auf Dienstleister betroffen
Ein Dienstleister von Vodafone Deutschland wurde von einem Cyberangriff getroffen. Alexander Fedosov – shutterstock.com Hacker haben einen externen Dienstleister von Vodafone angegriffen….
Cisco warns of another critical RCE flaw in ISE, urges immediate patching
Cisco has dropped another maximum severity advisory detailing an unauthenticated remote code execution (RCE) flaw in its Identity Services Engine (ISE) and…
Building scalable secrets management in hybrid cloud environments: Lessons from enterprise adoption
I’ll never forget the morning a few years ago, when a teammate accidentally pushed an AWS key to a public GitHub repo….