I’ll never forget the morning a few years ago, when a teammate accidentally pushed an AWS key to a public GitHub repo….
Browsing CategoryUncategorized
Clément Domingo: “We are not using AI correctly to defend ourselves”
Following Kaspersky Horizon on 1 July in Madrid, Clément Domingo, ethical hacker and cybersecurity evangelist, explains the cybercrime landscape now looks like…
8 trends transforming the MDR market today
The managed detection and response (MDR) market is having a moment. With traditional log collection and correlation tools struggling to keep up,…
Office-Supportende: Makro-Desaster verhindern
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?quality=50&strip=all 4576w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Ransomware actors target patched SonicWall SMA devices with rootkit
A group of hackers known for stealing enterprise data for extortion purposes has developed a persistent rootkit for SonicWall Secure Mobile Access…
Oracle-Lücke birgt Gefahr für RCE-Attacken
Oracle hat das Sicherheitsproblem im Code Editor bereits gefixt. sdx15 – shutterstock.com Forscher von Tenable Research haben eine Sicherheitslücke im Code-Editor von…
China-linked hackers target Taiwan chip firms in a coordinated espionage campaign
Chinese state-sponsored hackers have launched sophisticated espionage campaigns against Taiwan’s semiconductor industry, marking a dramatic escalation from sporadic attacks to sustained, coordinated…
Ermittlern gelingt Schlag gegen prorussische Hacker
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2337824495.jpg?quality=50&strip=all 6000w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2337824495.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2337824495.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2337824495.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2337824495.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2337824495.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2337824495.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2337824495.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2337824495.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2337824495.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2337824495.jpg?resize=444%2C250&quality=50&strip=all 444w”…
How AI is changing the GRC strategy
As businesses incorporate cybersecurity into governance, risk and compliance (GRC), it is important to revisit existing GRC programs to ensure that the…
Auswirkungen auf IT-Fachkräfte: 10 Anzeichen für einen schlechten CSO
Sind IT-Mitarbeiter unzufrieden, kann das an schlechten Führungskräften oder an einer unzureichenden IT-Strategie liegen. Foto: fizkes – shutterstock.com Unternehmen können die für…