The zero trust approach cybersecurity access control is more than 15 years old but organizations continue to struggle with its implementation due…
Date Archives December 2025
SpyCloud Data Shows Corporate Users 3x More Likely to Be Targeted by Phishing Than by Malware
Phishing has surged 400% year-over-year, highlighting need for real-time visibility into identity exposures. SpyCloud, the leader in identity threat protection, today released…
Das CISO-Paradoxon: Innovation ermöglichen und Risiken managen
CISOs sollten eng mit anderen Teams zusammenarbeiten. eamesBot – shutterstock.com Eine der Hauptaufgaben von CISOs besteht darin, nicht mehr die „Abteilung des…
Coupang breach of 33.7 million accounts allegedly involved engineer insider
A prolonged lack of management of valid authentication keys for signed access tokens issued to authenticators is believed to be the root…
Suspicious traffic could be testing CDN evasion, says expert
An individual or group is doing new probing of content delivery networks (CDNs), an effort that CSOs, CIOs and network administrators should…
AI creates new security risks for OT networks, warns NSA
The security of operational technology (OT) in critical infrastructure has been a recurring theme for years, but this week the US National…
From feeds to flows: Using a unified linkage model to operationalize threat intelligence
The problem: Static intelligence in a dynamic world Every CISO knows the fatigue that comes with modern threat intelligence. Dozens of vendor…
Windows shortcuts’ use as a vector for malware may be cut short
A longstanding problem with the way Windows handles LNK shortcut files, which attackers have been abusing for years to hide malicious commands…
Momberger: Betrug-E-Mails an Kunden im Umlauf
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2617671109.jpg?quality=50&strip=all 5150w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2617671109.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2617671109.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2617671109.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2617671109.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2617671109.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2617671109.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2617671109.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2617671109.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2617671109.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2617671109.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Submarine cable cybersecurity: protecting critical infrastructure
Between 95 and 99% of the world’s data traffic travels through submarine cables. An extensive network of more than 1.3 million kilometers,…