Black Hat 2025 is on its home stretch, having gathered together thousands of security professionals to discuss the latest developments in adversarial…
Date Archives August 2025
Hybrid Exchange environment vulnerability needs fast action
Administrators with hybrid Exchange Server environments are urged by Microsoft and the US Cybersecurity and Infrastructure Security Agency (CISA) to quickly plug…
Black Hat 2025: Latest news and insights
Black Hat USAAugust 2-7, 2025Las Vegas, NV Black Hat USA 2025 returns to the Mandalay Bay Convention Center in Las Vegas on…
Project Ire: Microsoft’s autonomous AI agent that can reverse engineer malware
Microsoft has introduced Project Ire, an autonomous AI agent capable of analyzing and classifying software as either malicious or benign, without any…
‘We too were breached,’ says Google, months after revealing Salesforce attacks
Google has now confirmed that it too was impacted by the Salesforce data theft attacks originally uncovered by its own threat intelligence…
HashiCorp Vault & CyberArk Conjur kompromittiert
Secrets Management und Remote Code Exceution gehen nicht gut zusammen. Alexsander Ovsyannikov | shutterstock.com In Enterprise-Umgebungen übersteigt die Anzahl nicht-menschlicher Identitäten (wie…
Anthropic targets DevSecOps with Claude Code update as AI rivals gear up
Anthropic has introduced automated security reviews in its Claude Code product, aiming to help developers identify and fix vulnerabilities earlier in the…
6 ways hackers hide their tracks
CISOs have an array of ever-growing tools at their disposal to monitor networks and endpoint systems for malicious activity. But cybersecurity leaders…
Windows tips for reducing the ransomware threat
As Scattered Spider headlines have reminded us of late, ransomware is always in season. The group has been around for many years,…
Beef up AI security with zero trust principles
Many CSOs worry about their firm’s AI agents spitting out advice to users on how to build a bomb, or citing non-existent…