Four security vulnerabilities have been found in the open source Ingress NGINX traffic controller that is extensively used by organizations in Kubernetes…
Date Archives February 2026
New APT group breached gov and critical infrastructure orgs in 37 countries
A new cyberespionage group that operates out of Asia has compromised 70 government and critical infrastructure organizations across 37 countries over the…
Substack data breach leaks users’ email addresses and phone numbers
Substack, a high-profile publishing platform widely used by academics, journalists, subject matter experts, and controversialists, has suffered a data breach affecting an…
Attackers exploit decade‑old Windows driver flaw to shut down modern EDR defenses
In a recent incident, attackers abused a legitimate but vulnerable Windows kernel driver to shut down endpoint security tools during an ongoing…
Ransomware-Attacke auf Buhlmann Group
Die Buhlmann Group wurde von einer Ransomware-Bande angegriffen. Der Hauptsitz in Deutschland ist jedoch verschont geblieben. Buhlmann Group Akira zählt zu den…
The silent security gap in enterprise AI adoption
Most security leaders believe they know where their sensitive data lives and how it is protected. That confidence is increasingly misplaced. As…
Microsoft develops a new scanner to detect hidden backdoors in LLMs
Microsoft has developed a scanner designed to detect backdoors in open-weight AI models, addressing a critical blind spot for enterprises increasingly dependent…
Building trust with the board through evidence-based proof
Cybersecurity is a boardroom issue, but meaningful dialogue often breaks down at the table. Boards ask about cybersecurity investments and cyber resilience;…
Kurz vor Olympia: Italien wehrt russische Hacker-Angriffe ab
width=”2488″ height=”1399″ sizes=”auto, (max-width: 2488px) 100vw, 2488px”>Russische Hacker haben kurz vor den Olympischen Winterspielen einige Standorte in Italien angegriffen. Die Angriffe wurden…
Software supply chain risks join the OWASP top 10 list, access control still on top
Software supply chain failures and mishandling of exceptional conditions are some of the additions to the updated OWASP Top 10, a list…