It’s easy for cybersecurity leaders to get caught up on the day-to-day of making sure teams are delivering and risks are being…
Browsing CategoryUncategorized
Was ist ein Botnet?
Ein Botnetz besteht aus vielen “Zombie”-Rechnern und lässt sich beispielsweise einsetzen, um DDoS-Attacken zu fahren. Das sollten Sie zum Thema wissen. FOTOKINA…
July Patch Tuesday: 14 critical Microsoft vulnerabilities, one SAP hole rated at 10 in severity
Microsoft’s July Patch Tuesday fixes are a mix of good news and bad news for CSOs: Fourteen of the vulnerabilities are rated…
ClickFix-Attacken bedrohen Unternehmenssicherheit
Cyberkriminelle greifen immer häufiger auf ClickFix-Angriffe zurück. NAJA x -shutterstock.com Weniger bekannt als Phishing ist die Social-Engineering-Methode ClickFix. Ziel solcher Attacken ist…
How a 12-year-old bug in Sudo is still haunting Linux users
Two new vulnerabilities have been found in Sudo, a privileged command-line tool installed on Linux systems, that can allow privilege escalation and…
The trust crisis in the cloud…and why blockchain deserves a seat at the table
As a cybersecurity consultant guiding organizations across the globe through digital transformation, I’ve observed one recurring pattern: We place immense trust in…
Chinese wegen US-Spionageverdacht in Mailand festgenommen
Ein Chinese wurde wegen Cyberbetrug und Identitätsdiebstahl festgenommen. Brian A Jackson – shutterstock.com Wegen des Verdachts der US-Spionage ist ein Chinese am…
How talent-strapped CISOs can tap former federal government cyber pros
Since January, thousands of federal government jobs have vanished through a combination of firings, layoffs and resignations. The cuts, a part of…
End of life for Microsoft Office puts malicious macros in the security spotlight
The upcoming end of life for Windows 10 has IT teams busy. From planning on migrations, to testing Windows 11 24H2, many…
Discovery of compromised Shellter security tool raises disclosure debate
CISOs whose staff use the commercial Shellter Elite antivirus evasion software to detect vulnerabilities need to immediately update to the latest version…