In today’s heightened geopolitical climate, business travel is no longer a routine operational necessity — it’s a strategic exposure. Whether you’re operating…
Date Archives July 2025
Cyberangriff auf australische Fluggesellschaft Qantas
Die australische Fluggesellschaft Qantas ist Opfer einer Cyberattacke. Ryan Fletcher – shutterstock.com Die australische Fluggesellschaft Qantas ist Opfer eines Cyberangriffs geworden. Hacker…
How cybersecurity leaders can defend against the spur of AI-driven NHI
Machine identities pose a big security risk for enterprises, and that risk will be magnified dramatically as AI agents are deployed. According…
Ransomware-Attacke auf Welthungerhilfe
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?quality=50&strip=all 8256w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/07/shutterstock_2183269825.jpg?resize=444%2C250&quality=50&strip=all 444w”…
LLMs are guessing login URLs, and it’s a cybersecurity time bomb
Large language models (LLMs) are casually sending users to the wrong web addresses, including unregistered, inactive, and even malicious sites, when asked…
LLMs are guessing website URLs, and it’s a cybersecurity time
Large language models (LLMs) are casually sending users to the wrong web addresses, including unregistered, inactive, and even malicious sites, when asked…
Download the ‘AI-ready data centers’ spotlight report
Download the July 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World. aria-label=”Embed of…
AI supply chain threats loom — as security practices lag
The AI software supply chain is rapidly expanding to include not only open-source development tools but also collaborative platforms where developers share…
CISOs must rethink defense playbooks as cybercriminals move faster, smarter
Last year nation-state incidents dominated cybersecurity headlines, as Chinese Typhoon threat groups and others made waves across several industries. But throughout the…
PowerShell überwachen – so geht‘s
Wird PowerShell nicht richtig überwacht, ist das Security-Debakel meist nicht weit. rsooll | shutterstock.com Kriminelle Hacker setzen mitunter auf raffinierte Techniken, um…