Enterprise admins who haven’t yet mitigated a two-month-old vulnerability in apps that incorporate the open source Spring Boot tool could be in…
Date Archives July 2025
Novel malware from Russia’s APT28 prompts LLMs to create malicious Windows commands
Russian cyberespionage group APT28 has developed malware that generates commands by querying large language models (LLMs). The malware, dubbed LAMEHUG by the…
Identity Management and Information Security News for the Week of July 18th: KnowBe4, SentinelOne, Okta, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
Vodafone von Hackerangriff auf Dienstleister betroffen
Ein Dienstleister von Vodafone Deutschland wurde von einem Cyberangriff getroffen. Alexander Fedosov – shutterstock.com Hacker haben einen externen Dienstleister von Vodafone angegriffen….
Cisco warns of another critical RCE flaw in ISE, urges immediate patching
Cisco has dropped another maximum severity advisory detailing an unauthenticated remote code execution (RCE) flaw in its Identity Services Engine (ISE) and…
Building scalable secrets management in hybrid cloud environments: Lessons from enterprise adoption
I’ll never forget the morning a few years ago, when a teammate accidentally pushed an AWS key to a public GitHub repo….
Clément Domingo: “We are not using AI correctly to defend ourselves”
Following Kaspersky Horizon on 1 July in Madrid, Clément Domingo, ethical hacker and cybersecurity evangelist, explains the cybercrime landscape now looks like…
8 trends transforming the MDR market today
The managed detection and response (MDR) market is having a moment. With traditional log collection and correlation tools struggling to keep up,…
Office-Supportende: Makro-Desaster verhindern
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?quality=50&strip=all 4576w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/07/Wachiwit-shutterstock_1453251818-NR_16z9.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Ransomware actors target patched SonicWall SMA devices with rootkit
A group of hackers known for stealing enterprise data for extortion purposes has developed a persistent rootkit for SonicWall Secure Mobile Access…