Cyberkriminelle hatten Zugriff auf die Daten eines Formel 1-Fahrers. Image Craft – shutterstock.com Hacker haben im Sommer unerlaubten Zugriff auf ein Fahrerportal…
Date Archives October 2025
Ransomware recovery perils: 40% of paying victims still lose their data
Two in five companies that pay cybercriminals for ransomware decryption fail to recover data as a result, according to a survey of…
Cloud Access Security Broker – ein Kaufratgeber
Lesen Sie, worauf es bei der Wahl eines Cloud Access Security Broker ankommt – und welche Anbieter was genau zu bieten haben….
AI browsers can be abused by malicious AI sidebar extensions: Report
AI browsers may be smart, but they’re not smart enough to block a common threat: Malicious extensions. That’s the conclusion of researchers…
Microsoft stoppt Ransomware-Angriffe auf Teams-Nutzer
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1719459637.jpg?quality=50&strip=all 4500w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1719459637.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1719459637.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1719459637.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1719459637.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1719459637.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1719459637.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1719459637.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1719459637.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1719459637.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_1719459637.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Why must CISOs slay a cyber dragon to earn business respect?
How CISOs respond to a major security incident can be a make-or-break moment for their career. Although one in four security leaders…
Manipulating the meeting notetaker: The rise of AI summarization optimization
These days, the most important meeting attendee isn’t a person: It’s the AI notetaker. This system assigns action items and determines the…
Cyberangriff auf Jaguar ist teuerster in britischer Geschichte
Der Hackerangriff auf den Autobauer Jaguar Land Rover hat die britische Regierung viel Geld gekostet. GAlexS – shutterstock.com Der Cyberangriff auf den…
6 Risk-Assessment-Frameworks im Vergleich
Mit dem richtigen Framework lassen sich Risiken besser ergründen. FOTOGRIN – shutterstock.com Für viele Geschäftsprozesse ist Technologie inzwischen unverzichtbar. Deshalb zählt diese…
Serious vulnerability found in Rust library
Developers creating projects in the Rust programming language, as well as IT leaders with Rust-based applications in their environments, should pay attention…