Research studies indicate that the average enterprise has between 40 and 80 separate security tools, a broad inventory that often leads to…
Date Archives November 2025
9 top bug bounty programs launched in 2025
Bug bounty programs remain a crucial component of cybersecurity strategies in 2025, offering organizations the ability to draw in help from a…
Google researchers detect first operational use of LLMs in active malware campaigns
Threat actors are now actively deploying AI-enabled malware in their operations. Google Threat Intelligence Group (GTIG) has identified cybercriminal use of “just-in-time”…
2026 – nichts für schwache CI(S)O-Nerven
Aus Sicht von Forrester bleibt die Lage für IT-(Sicherheits-)Entscheider auch 2026 angespannt. Maya Lab /Shutterstock Keine Entwarnung für IT-(Sicherheits-)Entscheider: Die Analysten von…
Russian APT abuses Windows Hyper-V for persistence and malware execution
Cyberespionage groups are always looking for novel ways to establish covert and long-term persistent access to compromised systems. The latest example comes…
WordPress plugin hole enables account takeover
The disclosure of a major security hole within a popular WordPress email plugin is a reminder to CISOs about the risks posed…
Office sandbox file security to disappear from enterprise Windows by late 2027, Microsoft confirms
Windows enterprise administrators will have until December 2027 at the latest to put in place alternatives to the security protection offered by…
Fehlendes KI-Training wird zum Sicherheitsrisiko
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?quality=50&strip=all 7717w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2296548467_16.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Louvre-Raubzug offenbart jahrzehntelanges Security-Versagen
Windows-Sicherheitsprobleme haben beim Louvre-Museum scheinbar Tradition. Shutterstock / Phil Pasquini Das Louvre-Museum in Paris wurde im Oktober 2025 bekanntlich von Einbrechern heimgesucht…
10 promising cybersecurity startups CISOs should know about
Coming up with an accurate head count for cybersecurity startups is virtually impossible, with a new ventures popping up seemingly every day….