The constantly growing number of acronyms in cyber security makes it difficult to maintain an overview and compare individual technologies. One example…
Browsing CategoryUncategorized
Root causes of security breaches remain elusive — jeopardizing resilience
Post-incident analysis remains a critical concern at most security organizations today. According to Foundry’s Security Priorities study, 57% of security leaders report…
Sneaky2FA phishing tool adds ability to insert legit-looking URLs
Since the introduction of multi-factor authentication (MFA), threat actors have been finding ways to get around what can be an effective defense…
Fortinet criticized for ‘silent’ patching after disclosing second zero-day vulnerability in same equipment
Only days after Fortinet was criticized by researchers for ‘silently’ patching a zero-day vulnerability without informing its customers, it has emerged that…
API-Exploit für AI-Browser Comet entdeckt
Sicherheitsforscher haben einen API-Exploit für den KI-Browser Comet offengelegt. Fajri Mulia Hidayat – shutterstock.com Der Security-Anbieter SquareX hat eine bisher nicht dokumentierte…
3 ways CISOs can win over their boards this budget season
As the year comes to a close, CISOs are already deep into building next year’s cybersecurity budget. That’s a difficult task in…
China‑linked PlushDaemon hijacks DNS via ‘EdgeStepper’ to weaponize software updates
PlushDaemon, a China-linked APT group, has been deploying a previously undocumented network implant dubbed EdgeStepper to hijack DNS traffic on compromised network…
Selling to the CISO: An open letter to the cybersecurity industry
The cybersecurity market has lost its mind. It seems like every week a new vendor appears, investors throw money at half-baked ideas,…
Attack Surface Management – ein Kaufratgeber
Mit diesen Attack Surface Management Tools sorgen Sie im Idealfall dafür, dass sich Angreifer gar nicht erst verbeißen. Sergey Zaykov | shutterstock.com…
Der große KI-Risiko-Guide
KI-Risiken zu bewerten und zu quantifizieren, ist in der GenAI-Ära unerlässlich. Lerbank-bbk22 | shutterstock.com Wie jede Technologie birgt auch künstliche Intelligenz (KI)…