Palo Alto Networks is making what could be its biggest bet yet by agreeing to buy Israeli identity security company CyberArk for…
Date Archives July 2025
Erneuter Hackerangriff bei Orange
width=”2470″ height=”1389″ sizes=”(max-width: 2470px) 100vw, 2470px”> Nachdem bereits im Februar die rumänische Niederlassung gehackt wurde, geriet Orange nun erneut unter Beschuss. Arsenie…
Dobrindt prüft Einsatz von US-Software Palantir
Kann sich den Einsatz von Palantir vorstellen: Bundesinnenminister Dobrindt hotocosmos1 – shutterstock.com Bundesinnenminister Alexander Dobrindt (CSU) prüft den bundesweiten Einsatz der umstrittenen…
Ransomware upstart Gunra goes cross-platform with encryption upgrades
A new Linux variant of the “Gunra” ransomware family has been identified with highly configurable multithreading, allowing attackers to run up to…
Palo Alto Networks eyes $20B CyberArk deal as identity security takes center stage
Palo Alto Networks is closing in on what could be its biggest bet yet: a more than $20 billion acquisition of Israeli…
How CISOs can scale down without compromising security
Years ago, David Mahdi, now a CISO advisor at Transmit Security, found himself in a situation no security leader wants to face:…
Prepping for the quantum threat requires a phased approach to crypto agility
Enterprises need to act now to address the threats future quantum computing advances pose to current encryption standards. But the transition to…
MCP‑Sicherheit: Das Rückgrat von Agentic AI sichern
Im Zuge von Agentic AI sollten sich CISOs mit MCP-Sicherheit auseinandersetzen. Wanan Wanan – shutterstock.com Das Model Context Protocol (MCP) wurde erst Ende 2024…
Google patches Gemini CLI tool after prompt injection flaw uncovered
It’s barely been out for a month and already security researchers have discovered a prompt injection vulnerability in Google’s Gemini command line…
Auto-Color RAT targets SAP NetWeaver bug in an advanced cyberattack
Threat actors recently tried to exploit a freshly patched max-severity SAP Netweaver flaw to deploy a persistent Linux remote access trojan (RAT)…