The 2017 Equifax breach was one of biggest security incidents of the 21st century. A textbook data leak case, the breach impacted more than 147…
Date Archives December 2025
Daran scheitert Passwordless
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?quality=50&strip=all 8256w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Cybercrime Inc.: Wenn Hacker besser organsiert sind als die IT
Cybercrime hat sich zur organisierten Industrie mit Arbeitsteilung gewandelt. DC Studio – Shutterstock.com Was einst in Foren mit selbstgeschriebenen Schadcodes begann, hat…
So geht Post-Incident Review
Post-Incident Reviews können dazu beitragen, die richtigen Lehren aus Sicherheitsvorfällen zu ziehen – wenn sie richtig aufgesetzt sind. dotshock | shutterstock.com Angenommen,…
6 cyber insurance gotchas security leaders must avoid
Facing ever-mounting cyberthreats, enterprises are increasingly turning to cyber insurance to address the potentially severe financial damage a successful attack can inflict….
Patch Tuesday 2025 roundup: The biggest Microsoft vulnerabilities of the year
Every day has the potential to be a bad day for a CSO. However, the second Tuesday of each month – Patch…
Sieben Anzeichen dafür, dass Ihr Cybersecurity-Framework überarbeitet werden muss
Cybersecurity ist kein Nice-to-have, sondern ein Muss. Dennoch vernachlässigen immer noch zu viele Unternehmen seine Pflege. Summit Art Creations – shutterstock.com Cybersicherheits-Frameworks…
React2Shell: Anatomy of a max-severity flaw that sent shockwaves through the web
The React 19 library for building application interfaces was hit with a remote code vulnerability, React2Shell, about a month ago. However, as researchers delve…
Top 5 real-world AI security threats revealed in 2025
The year of agentic AI came with promises of massive productivity gains for businesses, but the rush to adopt new tools and…
Tipps für CISOs, die die Branche wechseln wollen
Tipps für CISOs mit “Vertical-Switch-Ambitionen”. FotoDax | shutterstock.com In der Außenperspektive sollte es für Menschen, die es zum Chief Information Security Officer…