Much of the narrative I come across online around cybersecurity budgets revolves around convincing the Board and justifying investments. Some approaches are…
Date Archives December 2025
Ivantis EPM-Systeme anfällig für Angriffe
Unternehmen sollten ihre EPM-Systeme von Ivanti so bald wie möglich patchen, da dort schwerwiegende Sicherheitslücken entdeckt wurden. ImageFlow – shutterstock.com Ivanti hat…
How to justify your security investments
In modern corporate environments, investments in security technologies are no longer judged solely on technical maturity. Funding increasingly depends on the extent…
Mit MXDR gegen den Fachkräftemangel
Mit dem Einsatz von MXDR können Unternehmen ihr IT-Security-Team durch Experten erweitern und deren Expertise nutzen. G Data IT-Sicherheit ist für Unternehmen…
Fortinet admins urged to update software to close FortiCloud SSO holes
Admins using FortiCloud SSO (single sign on) to authenticate access to Fortinet products are urged to upgrade the software running some of…
Security researchers given new boost
Computer security researchers are in the spotlight as governments look to tackle the growing threat of cybercrime. Last week, British security minister…
Hidden .NET HTTP proxy behavior can open RCE flaws in apps — a security issue Microsoft won’t fix
Researchers uncovered an unexpected behavior of HTTP client proxies when created in .NET code, potentially allowing attackers to write malicious code to…
How can staff+ security engineers force-multiply their impact?
Staff+ engineers play a critical role in designing, scaling and influencing the security posture of an organization. Their key areas of expertise…
Hundreds of Ivanti EPM systems exposed online as critical flaw patched
Ivanti has patched a critical vulnerability in Endpoint Manager that enables attackers to hijack administrator sessions without authentication and potentially control thousands…
Behind the breaches: Case studies that reveal adversary motives and modus operandi
In today’s threat landscape, it’s no longer enough to focus solely on malware signatures and IP addresses. Defenders must understand how adversaries…