The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
Date Archives August 2025
Cybercrooks faked Microsoft OAuth apps for MFA phishing
Threat actors have cooked up a clever way to slip past multifactor authentication (MFA), tricking users into approving fake app access requests…
Spotlight report: How AI is reshaping IT
Download the August 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World. aria-label=”Embed of…
Wie EDR EDR aushebelt
Legitime Security-Tools gegeneinander auszuspielen, eröffnet Cyberkriminellen diverse Vorteile. Tero Vesalainen | shutterstock.com Cybersicherheitsforscher haben einen unheilvollen neuen Angriffsvektor entdeckt. Dabei könnten Angreifer…
Microsoft-Sicherheitslücke in Deutschland weit verbreitet
width=”2490″ height=”1400″ sizes=”(max-width: 2490px) 100vw, 2490px”>Die Gefahr ist noch nicht gebannt: Experten verzeichnen weiter steigende Infektionszahlen. Ascannio – shutterstock.com Deutsche Unternehmen, Behörden…
Summer: Why cybersecurity must be strengthened as vacations abound
Summer is a time for vacation and a well-deserved break from the intensity of work. It’s also a great time to be…
SentinelLabs uncovers China’s hidden cyber-espionage arsenal
A number of patents have been granted to companies in the People’s Republic of China (PRC) involving “highly intrusive forensics and data…
Customer Identity & Access Management: Die besten CIAM-Tools
Wir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt. Jackie Niam | shutterstock.com Customer Identity &…
How bright are AI agents? Not very, recent reports suggest
Security researchers are adding more weight to a truth that infosec pros had already grasped: AI agents are not very bright, and…