A critical authentication bypass by spoofing vulnerability in AMI MegaRAC SPx server management firmware is now being actively exploited by attackers, creating…
Date Archives June 2025
US indicts one for role in BreachForums, France arrests four others
-Shweta Sharma A US court indicted a man accused of being IntelBroker, a key administrator of stolen data marketplace BreachForums, on Wednesday,…
SAP-Schwachstellen gefährden Windows-Nutzerdaten
Schwachstellen in SAP GUI geben sensible Daten durch schwache oder fehlende Verschlüsselung preis. LALAKA – shutterstock.com Die Forscher Jonathan Stross von Pathlock,…
CrowdStrike is cutting jobs in favor of AI. Here’s why you shouldn’t.
Security giant CrowdStrike announced via an official SEC filing last month that it plans to cut approximately 500 jobs — about 5%…
Energienetze: Neue Regeln sollen Sicherheitslücke schließen
Betreiber von Energieanlagen müssen künftig die Sicherheit ihrer kritischen IT-Komponenten prüfen lassen. Pand P Studio – shutterstock.com Im Energiesektor müssen Betreiber von…
How to make your multicloud security more effective
The days of debating whether cloud or on-premises is the best location for your servers are thankfully far behind us. But lately,…
The top red teamer in the US is an AI bot
AI is getting so good that it’s outperforming human red teamers. The hacker “Xbow” now tops an eminent US security industry leaderboard…
Misconfigured MCP servers expose AI agent systems to compromise
Agentic AI is on the rise, and Model Context Protocol (MCP) servers are fast proving to be essential tools for providing AI…
Ransomware: So viel Lösegeld zahlen Unternehmen
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2524192439.jpg?quality=50&strip=all 8000w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2524192439.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2524192439.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2524192439.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2524192439.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2524192439.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2524192439.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2524192439.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2524192439.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2524192439.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/06/shutterstock_2524192439.jpg?resize=444%2C250&quality=50&strip=all 444w”…
SAP GUI flaws expose sensitive data via weak or no encryption
SAP GUI, a trusted interface for hundreds of thousands of global enterprises, has been found to be storing sensitive user data with…