Distributed denial-of-service (DDoS) attacks come in many shapes and sizes, as do the myths surrounding them. These myths can center on motivations, DDoS…
Date Archives January 2026
Ten thousand firewalls are vulnerable to old vulnerability
Bleeping Computer reports that hackers are exploiting an old vulnerability in FortiOS that can be used to get around the two-factor authentication…
Stress caused by cybersecurity threats is taking its toll
As cyber threats become more frequent and more complex, they’re causing visible, measurable damage to organizations’ reputations and bottom lines. But the…
Taiwan subjected to 2.6 million Chinese cyberattacks a day in 2025
Taiwan’s National Security Agency states that the number of Chinese cyberattacks against the country’s critical infrastructure increased by 6% in 2025, averaging…
Several countries investigate Elon Musk’s Grok after sexualized deepfakes on women and children
France and Malaysia have launched investigations against Elon Musk’s AI chatbot Grok, after it generated sexualized deepfakes of women and minors, Techcrunch…
How the Organizational Risk Culture Standard can supercharge your cybersecurity culture
You don’t lose most cyber battles to code. You lose them to culture: A rushed approval. A silent near-miss. A leader who…
Cybersecurity firm turns tables on threat actors with decoy data trap
Cybersecurity firm Resecurity says it deliberately lured threat actors linked to Scattered Lapsus$ Hunters (SLH) alliance into a honeypot, after the group…
Cybersecurity leaders’ resolutions for 2026
As the AI-hype dust settles, CISOs have a lot to focus on 2026. From ongoing struggles such as ensuring teams are not…
Was ist Federated Identity Management?
Federated Identity optimiert Komfort und Sicherheit auf Kosten der Komplexität. PeachShutterStock | shutterstock.com Im Kern der Enterprise Security steht die Zerreißprobe zwischen…
Was bei der Cloud-Konfiguration schiefläuft – und wie es besser geht
Fehlerhaft konfigurierte Cloud-Dienste sorgen regelmäßig für Datenlecks – und schlimmeres. DC Studio | shutterstock.com Konfigurationsfehler in der Cloud, die Unternehmensdaten gefährden, sind…