In my long career of safeguarding digital assets, I’ve seen technology shifts come and go, but nothing compares to the disruptive force…
Date Archives January 2026
What to Expect from the Solutions Spotlight with ThreatLocker on January 13th, 2026
Solutions Review’s Solution Spotlight with ThreatLocker is part of an exclusive webinar series for enterprise business software users. This event will outline…
Cybersecurity at the edge: Securing rugged IoT in mission-critical environments
Edge computing is no longer a futuristic concept; it’s a reality shaping mission-critical operations across defense, utilities and public safety. Rugged IoT…
Phishing-Angreifer setzen vermehrt auf E-Mail-Routing-Lücken
Angreifer missbrauchen falsch konfigurierte Richtlinien, um Phishing-E-Mails wie interne E-Mails aussehen zu lassen, Filter zu umgehen und Anmeldedaten zu stehlen. batjaket –…
NIS2-Umsetzung: Neues BSI-Portal geht an den Start
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?quality=50&strip=all 7500w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2691920437.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Critical jsPDF vulnerability enables arbitrary file read in Node.js deployments
A now-fixed critical flaw in the jsPDF library could enable attackers to extract sensitive files from enterprise servers and embed them directly…
Top cyber threats to your AI systems and infrastructure
Attacks against AI systems and infrastructure are beginning to take shape in real-world instances, and security experts expect the number of these…
Die wichtigsten CISO-Trends für 2026
Lesen Sie, vor welchen Herausforderungen CISOs mit Blick auf das Jahr 2026 stehen. SuPatMaN – shutterstock.com Das Jahr 2025 war für viele…
Holes in Veeam Backup suite allow remote code execution, creation of malicious backup config files
Veeam says that four vulnerabilities could allow a person with certain oversight roles for its flagship Backup & Replication suite to do…
Critical RCE flaw allows full takeover of n8n AI workflow platform
Researchers have released details about a critical vulnerability that was silently patched in n8n, a platform used by many companies to build…