Certain IoT security concerns, like botnets, are hard to forget, but others might not come to mind as easily, including DNS threats…
Browsing CategoryUncategorized
Sixfold surge of ClickFix attacks threatens corporate defenses
Incidents of ClickFix — the social engineering attack technique that tricks users into executing malicious code — are skyrocketing. ClickFix attacks typically…
Auf der Suche nach Alternativen zum CVE-Programm
Sollte das CVE-Programm eingestellt werden, wäre die Bewertung und Behebung von Sicherheitslücken schwieriger. Dave Hoeek – shutterstock.com Der jüngste kurze Panikausbruch wegen…
Second espionage-linked cyberattack hits ICC, exposing persistent threats to global justice systems
The International Criminal Court (ICC) has fallen victim to another sophisticated cyberattack, the second major cyber espionage attempt targeting the war crimes…
Critical RCE flaw in Anthropic’s MCP inspector exposes developer machines to remote attacks
A critical remote code execution (RCE) bug in Anthropic’s Model Context Protocol (MCP) inspector tool could allow attackers to run arbitrary commands…
Securing the next wave of workload identities in the cloud
It was a moment of realization for our mid-size law team. As we were constructing a new cloud-native analytics pipeline that spanned…
Scattered Spider shifts focus to airlines as strikes hit Hawaiian, WestJet — and now Qantas
A data breach at Qantas via a third-party service is typical of the Scattered Spider attack group, experts say. “Qantas’ cyber breach…
Why every company needs a travel security program
In today’s heightened geopolitical climate, business travel is no longer a routine operational necessity — it’s a strategic exposure. Whether you’re operating…
Cyberangriff auf australische Fluggesellschaft Qantas
Die australische Fluggesellschaft Qantas ist Opfer einer Cyberattacke. Ryan Fletcher – shutterstock.com Die australische Fluggesellschaft Qantas ist Opfer eines Cyberangriffs geworden. Hacker…
How cybersecurity leaders can defend against the spur of AI-driven NHI
Machine identities pose a big security risk for enterprises, and that risk will be magnified dramatically as AI agents are deployed. According…