Die neue CYROS-App verknüpft Sicherheitswarnungen von Behörden und Fachquellen, um über Cybersicherheitsvorfälle zu informieren. Rawat Yapathanasap – shutterstock.com Ransomware-Attacken, Phishing und digitale…
Date Archives February 2026
Phishing campaign chains old Office flaw with fileless XWorm RAT to evade detection
Fortinet researchers have disclosed a new phishing campaign delivering the commercially available XWorm malware, chaining a years-old Microsoft Office vulnerability with fileless…
Palo Alto closes privileged access gap with $25B CyberArk acquisition
Cybersecurity company Palo Alto Networks has completed its $25 billion acquisition of Israel-based identity security firm CyberArk, bringing privileged access and identity…
The ephemeral infrastructure paradox: Why short-lived systems need stronger identity governance
In my experience leading engineering projects, I have encountered the same pattern repeatedly. We obsess over deployment speed. We measure success in…
What CISOs need to know about the OpenClaw security nightmare
The new personal AI agent orchestration tool known as OpenClaw — formerly Clawdbot, then Moltbot — is a personal assistant that can…
Entwickler werden zum Angriffsvektor
Softwareentwickler sind gefragt – auch unter kriminellen Hackern. Gorodenkoff | shutterstock.com Statt einfach “nur” Fehler in Applikationen auszunutzen, entdecken kriminelle Hacker zunehmend…
SSHStalker botnet brute-forces its way onto 7,000 Linux machines
A newly discovered botnet is compromising poorly-protected Linux servers by brute-forcing weak SSH password login authentication. Researchers at Canada-based Flare Systems, who…
Companies are using ‘Summarize with AI’ to manipulate enterprise chatbots
That handy ‘Summarize with AI’ button embedded in a growing number of websites, browsers, and apps to give users a quick overview…
What to Expect from the Solutions Spotlight with Object First on March 12th, 2026
Solutions Review’s Solution Spotlight with Object First is part of an exclusive webinar series for enterprise business software users. This event will…
North Korean actors blend ClickFix with new macOS backdoors in Crypto campaign
A financially motivated threat actor tracked as UNC1609 is using a ClickFix-style social engineering campaign to deploy multiple macOS malware families against…