Google DeepMind has introduced an AI agent that automatically found and fixed software vulnerabilities in open source projects, submitting 72 security patches…
News
Phishers turn 1Password’s Watchtower into a blind spot
Malwarebytes has flagged a new phishing campaign that weaponized user trust in 1Password’s breach notification system, adding that an employee nearly handed…
Is the CISO chair becoming a revolving door?
CISO tenures average just 18 to 26 months, compared with nearly five years for the broader C-suite, according to CISO Workforce and…
Oracle issues emergency patch for zero-day flaw exploited by Cl0p ransomware gang
It’s the bad news that many customers of Oracle E-Business Suite (EBS) have been dreading: reports of ransomware attacks targeting the software…
Cl0p nutzt Schwachstelle bei Oracle aus
Die Cl0p-Bande nutzt Zero-Day-Schwachstelle bei Oracle für Cyberattacken aus. Dragos Asaftei / Shutterstock Oracle hat ein Notfall-Update veröffentlicht, um eine kritische Sicherheitslücke…
Gemini Trifecta: AI autonomy without guardrails opens new attack surface
Security researchers at Tenable revealed three distinct vulnerabilities across Gemini’s cloud assist, search optimization, and browsing components. If exploited, these flaws allow…
Cyberbedrohungslage für KMUs spitzt sich zu
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?quality=50&strip=all 7360w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/10/shutterstock_659365795.jpg?resize=444%2C250&quality=50&strip=all 444w”…
CISOs rethink the security organization for the AI era
The ever-changing cybersecurity landscape has long kept CISOs on their toes and now AI is bringing new challenges in how security teams…
Extortion gang opens data leak site to squeeze victims of its Salesforce attacks
The Scattered Lapsus$ Hunters gang, which says it has stolen data from the Salesforce instances of dozens of international companies in recent…
Newly-discovered threat group hijacking IIS servers for SEO fraud, warns Cisco Talos
A Chinese-speaking cybercrime group is aggressively targeting vulnerable Internet Information Server (IIS) web servers for use in search engine optimization (SEO) fraud,…