IT-Security-Verantwortliche sollten die Angriffsfläche permanent analysieren und schützen. Dazu müssen sie stets im Blick haben, welche Assets über das Internet erreichbar sind….
Date Archives September 2025
Identity Management and Information Security News for the Week of September 5th: Keeper Security, 1Kosmos, Druva, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
Hacker nutzen gravierende Schwachstelle bei SAP S/4HANA aus
Ein Exploit für die Schwachstelle wurde bereits in freier Wildbahn beobachtet. Nitpicker / Shutterstock Vergangenen Monat hat SAP einen Patch für S/4HANA…
You should be aware of these latest social engineering trends
Instead of relying on advanced tools or complex scripts, experienced attackers penetrate systems and steal data using the most effective weapon of…
Massiver Anstieg bei Hackerangriffen auf deutschen Bildungssektor
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2626144453.jpg?quality=50&strip=all 7680w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2626144453.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2626144453.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2626144453.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2626144453.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2626144453.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2626144453.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2626144453.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2626144453.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2626144453.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2626144453.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Sendmarc appoints Rob Bowker as North American Region Lead
Veteran email security leader to expand MSP and VAR partnerships and accelerate DMARC adoption. Sendmarc today announced the appointment of Rob Bowker…
Lack of board access: The No. 1 factor for CISO dissatisfaction
Cybersecurity leaders agree that they must engage with the board at their organizations to do their jobs. In reality, board engagement lags,…
Authentifizierungslösungen: 10 Passwordless-Optionen für Unternehmen
Um Passwörter hinter sich zu lassen, gibt es bessere Lösungen. Wir zeigen Ihnen zehn. Foto: Raffi Ilham Pratama – shutterstock.com Passwörter sind…
Alert: Exploit available to threat actors for SAP S/4HANA critical vulnerability
SAP S/4HANA admins who haven’t already installed a critical August 11 patch could be in trouble: An exploit for the code injection…
Sitecore zero-day configuration flaw under active exploitation
A sample ASP.NET machine key in old deployment guides for Sitecore products is being exploited by attackers to launch ViewState code injection…