An advanced persistent threat (APT) group, Flax Typhoon, was able to gain persistent access to the mapping tool ArcGIS for over a…
Date Archives October 2025
Introducing MAESTRO: A framework for securing generative and agentic AI
Artificial Intelligence (AI) is advancing at a pace that outstrips traditional security frameworks. Generative AI has already changed how financial institutions analyze…
TigerJack’s malicious VSCode extensions mine, steal, and stay hidden
In a new disclosure, security researchers revealed that a threat actor group called TigerJack has been publishing malicious extensions on Microsoft’s Visual…
Deutsche Logistik schlecht vor Cyberattacken geschützt
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2475142117.jpg?quality=50&strip=all 3840w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2475142117.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2475142117.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2475142117.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2475142117.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2475142117.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2475142117.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2475142117.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2475142117.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2475142117.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_2475142117.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Beyond the checklist: Building adaptive GRC frameworks for agentic AI
If you’re like me, you’re noticing a chilling disconnect in the boardroom: The speed of agentic AI adoption vastly outpaces the maturity…
Hacker attackieren Vergabeportal für öffentliche Aufträge
Prorussische Hacker haben die Internetseite des Deutschen Vergabeportals fast eine Woche lang lahmgelegt. ozrimoz – shutterstock Prorussische Hacker haben nach einem Bericht…
13 cybersecurity myths organizations need to stop believing
The past few years have seen a dramatic shift in how organizations protect themselves against attackers. The rise of AI and the…
Was ist ein Keylogger?
Keylogger sind Malware der alten Schule. Lesen Sie, wie die Tools zur Tastaturüberwachung funktionieren und warum sie nicht nur etwas für Cyberkriminelle…
October 2025 Patch Tuesday: Holes in Windows Server Update Service and an ancient modem driver
Microsoft’s October Patch Tuesday releases will fix 167 vulnerabilities, the highest number this year, including seven rated as critical that need immediate…
Scattered Lapsus$ Hunters extortion site goes dark: What’s next?
Is this really the end of the road for the notorious Scattered Lapsus$ Hunters ransomware alliance? Last week, the extortion supergroup had…