Wenn OT-Fachkräfte in den Ruhestand gehen, droht ein massiver Wissensverlust. Das kann erhebliche Folgen für die Cybersicherheit haben. vectorfusionart – shutterstock.com Zwar…
Date Archives February 2026
Notepad++ infrastructure hijacked by Chinese APT in sophisticated supply chain attack
The popular open-source text editor Notepad++ was targeted in a sophisticated supply chain attack that allowed Chinese state-sponsored hackers to deliver malware…
Think agentic AI is hard to secure today? Just wait a few months
Early experimentation with agentic AI has given CISOs a preview of the possible cybersecurity nightmares ahead. But with autonomous agent adoption expected…
Shai-Hulud & Co.: The software supply chain as Achilles’ heel
Today’s applications are based on numerous components, each of which, along with the development environments themselves, represents an attack surface. Regardless of…
Was tun, wenn die Erpresser kommen?
Ruhe bewahren und keine übereilten Sachen machen, empfiehlt Podcast-Gast Joanna Lang-Recht. intersoft consulting services AG Montagmorgen, 8:00 Uhr. Die Mitarbeitenden können sich…
New phishing attack leverages PDFs and Dropbox
Even as they become ever more stealthy with AI-driven tools, threat actors are not giving up on simple, tried-and-true phishing — because…
Microsoft disables NTLM in Windows
Microsoft has announced that the phase-out of NT LAN Manager (NTLM) is now transitioning to disabling the protocol by default, in an…
Human Risk Management: Das Paradoxon der Sicherheitsschulungen
Security Awareness Trainings sollten auf dem Human-Risk-Management-Ansatz basieren. FAMILY STOCK – shutterstock.com Unternehmen investieren Millionen von Dollar in Firewalls, Endpunktsicherheit oder Verschlüsselung….
How risk culture turns cyber teams predictive
The first time you’ll hear, “We’re always in incident mode,” it won’t be said with drama. It will be said the way…
This stealthy Windows RAT holds live conversations with its operators
Security researchers at Point Wild have disclosed a new Windows malware campaign that uses a multi-stage infection chain to establish persistent, memory-resident…