Die Cl0p-Bande nutzt Zero-Day-Schwachstelle bei Oracle für Cyberattacken aus. Dragos Asaftei / Shutterstock Oracle hat ein Notfall-Update veröffentlicht, um eine kritische Sicherheitslücke…
Date Archives October 2025
Gemini Trifecta: AI autonomy without guardrails opens new attack surface
Security researchers at Tenable revealed three distinct vulnerabilities across Gemini’s cloud assist, search optimization, and browsing components. If exploited, these flaws allow…
Cyberbedrohungslage für KMUs spitzt sich zu
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?quality=50&strip=all 7360w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=444%2C250&quality=50&strip=all 444w”…
CISOs rethink the security organization for the AI era
The ever-changing cybersecurity landscape has long kept CISOs on their toes and now AI is bringing new challenges in how security teams…
Extortion gang opens data leak site to squeeze victims of its Salesforce attacks
The Scattered Lapsus$ Hunters gang, which says it has stolen data from the Salesforce instances of dozens of international companies in recent…
Newly-discovered threat group hijacking IIS servers for SEO fraud, warns Cisco Talos
A Chinese-speaking cybercrime group is aggressively targeting vulnerable Internet Information Server (IIS) web servers for use in search engine optimization (SEO) fraud,…
Identity Management and Information Security News for the Week of October 3rd: SailPoint, Corsha, Socure, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
That CISO job offer could be a ‘pig-butchering’ scam
The recent experience of a seasoned security leader illustrates how fake job offers are increasingly being used as entry points for “pig-butchering”…
Cl0p-linked threat actors target Oracle E-Business Suite in extortion campaign
Oracle E-Business Suite users beware: Hackers may (or may not) have stolen your sensitive data. Researchers at Halcyon, Google, and Mandiant have…
Red Hat OpenShift AI weakness allows full cluster compromise, warns advisory
Red Hat has updated its OpenShift AI Service after discovering a vulnerability with a CVSS rating of 9.9 that would allow an…