Enterprises relying on Gladinet’s file-sharing services are faced with another round of zero-day patching, this time to block attackers from abusing cryptographic…
Date Archives December 2025
Identity Management and Information Security News for the Week of December 12th: Commvault, Saviynt, Outpost24, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
Zero-Trust-Umsetzung: Die richtige Kommunikation zählt
Möchten CISOs neue Strategien wie Zero Trust einführen, ist die richtige Kommunikation entscheidend. HZ Creations – shutterstock.com Die Umsetzung großer Transformationsinitiativen, wie…
Cyberangriff auf Rathaus: Hacker veröffentlichen Daten im Darknet
Cyberkriminelle haben Daten bei der Gemeindeverwaltung Untereisesheim gestohlen und im Darknet veröffentlicht. BeeBright – shutterstock.com Mitte Oktober funktionierte im Rathaus Untereisesheim fast…
How to simplify enterprise cybersecurity through effective identity management
Identifying and securing ownership of assets can be a challenging task. In addition to multifactor authentication, conditional and privileged access can help…
OpenAI expands ‘defense in depth’ security to stop hackers using its AI models to launch cyberattacks
OpenAI is preparing for the possibility that threat groups will try to abuse its increasingly powerful AI frontier models to carry out…
Meet ConsentFix, a new twist on the ClickFix phishing attack
A new variation of the ClickFix scam tries to get around phishing defenses by capturing an employee’s OAuth authentication token for Microsoft…
Wie im Netz gezielt manipuliert wird
Cyberkriminelle nutzen SIM-Karten vom Graumarkt für virtuelle Bot-Armeen. K2LStudio – shutterstock.com Ein umfangreicher internationaler Graumarkt mit SIM-Mobilfunkkarten fördert im großen Stil Manipulationen…
SAML authentication broken almost beyond repair
Researchers have uncovered fresh techniques for breaking SAML-based authentication, further undermining the security assurances offered by the aging by still widely used…
Battering RAM hardware hack breaks secure CPU enclaves
Confidential computing, powered by hardware technologies such as Intel SGX (Software Guard Extensions) and AMD SEV (Secure Encrypted Virtualization), promises strong isolation…