Cybersecurity’s core mission remains the same: Defend the organization from all the dangers that lurk in the digital space. But what constitutes…
Date Archives September 2025
9 unverzichtbare Open-Source-Security-Tools
Diese Open-Source-Tools adressieren spezifische Security-Probleme – mit minimalem Footprint. Foto: N Universe | shutterstock.com Cybersicherheitsexperten verlassen sich in diversen Bereichen auf Open-Source-Lösungen…
Zehn Karrierekiller für CISOs
CISOs müssen sich anpassen und weiterentwickeln. Nur so können sie selbst und ihre arbeitgebenden Unternehmen florieren. Ground Picture – Shutterstock.com CISOs tragen…
VoidProxy phishing-as-a-service operation steals Microsoft, Google login credentials
Identity and access management provider Okta has discovered what it says is a novel phishing-as-a-service (PhaaS) operation that, if victims fall for…
VMScape Spectre BTI attack breaks VM isolation on AMD and Intel CPUs
Researchers have demonstrated a Spectre-like CPU branch target injection attack that allows malicious virtual machine users to leak sensitive information from host…
How Wesco cut through the noise and reimagined risk management
Wesco is best known as a leading supply chain partner that provides electrical and communication systems and safety equipment to utilities, manufacturers,…
2025 CSO Hall of Fame: Laura Deaner on AI, quantum threats, and cyber leadership
Laura Deaner, recently appointed chief information security officer at the Depository Trust & Clearing Corporation (DTCC), has spent more than 25 years…
Identity Management and Information Security News for the Week of September 12th: GetReal Security, Xage Security, SentinelOne, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
Stealthy AsyncRAT flees the disk for a fileless infection
Security researchers have discovered an open-source remote access trojan, AsyncRAT, being delivered through a multi-stage, in-memory loader as adversaries move to fileless…
Why domain-based attacks will continue to wreak havoc
Among the numerous cyber threats that enterprises must contend with, domain-based attacks hold a prominent position. These are attacks that target or…