Oracle has handed security teams their first big patching workload of the year, with its latest quarterly update containing a hefty 337…
Date Archives January 2026
EU reviews cybersecurity to limit danger from high-risk suppliers
The European Commission has presented a new cybersecurity package to strengthen the European Union’s resilience to increasing cyber and hybrid attacks from…
Contagious Interview turns VS Code into an attack vector
Threat actors behind the long-running Contagious Interview campaign were seen expanding from traditional social-engineering lures to the abuse of Microsoft Visual Studio…
Hacker erbeuten rund 42.000 Datensätze von Ingram Micro
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?quality=50&strip=all 4091w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/07/JHVEPhoto-shutterstock_2180041769_NR_16z9.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Vulnerability prioritization beyond the CVSS number
The common vulnerability scoring system (CVSS) has long served as the industry’s default for assessing vulnerability severity. It has become one of…
EU-Kommission will Huawei und ZTE aus Netzen verbannen
Die EU-Kommission will chinesische Hersteller wie Huawei und ZTE aus europäischen Mobilfunknetzen verbannen, um die Cybersicherheit zu verbessern. Jacek Wojnarowski – shutterstock.com…
13 cyber questions to better vet IT vendors and reduce third-party risk
Increased reliance on IT service providers, digital tools, and third-party software is greatly expanding the enterprise attack surface, with noteworthy cyberattacks over…
For cyber risk assessments, frequency is essential
From a certain age, many people regularly visit their doctor for check-ups. In this way, risks and dangers can be identified early…
Third Party Risk Management: So vermeiden Sie Compliance-Unheil
Third Party Risk Management hilft Unternehmen, das Risiko von Compliance-Verstößen zu vermeiden. Foto: Diyajyoti – shutterstock.com In Zeiten der Digitalisierung ist es…
Three vulnerabilities in Anthropic Git MCP Server could let attackers tamper with LLMs
Threat actors could use prompt injection attacks to take advantage of three vulnerabilities in Anthropic’s official Git MCP server and cause mayhem…