Security information and event management (SIEM) platforms have evolved far beyond their basic log collection and correlation roots. With cyber threats moving…
News
Hackers turn bossware against the bosses
A threat actor is abusing an employee monitoring application and a remote monitoring and management platform in an attempt to deploy ransomware…
Why identity recovery is now central to cyber resilience
Ransomware has permanently changed how security leaders think about risk. Verizon’s 2025 Data Breach Investigations Report found that ransomware was involved in…
‘Dead’ Outlook add-in hijacked to phish 4,000 Microsoft Office Store users
A blind spot in Microsoft’s app and add-in marketplace security allowed an eagle-eyed hacker to hijack an abandoned Outlook add-in to carry…
Neue Warn-App für Cybervorfälle gestartet
Die neue CYROS-App verknüpft Sicherheitswarnungen von Behörden und Fachquellen, um über Cybersicherheitsvorfälle zu informieren. Rawat Yapathanasap – shutterstock.com Ransomware-Attacken, Phishing und digitale…
Phishing campaign chains old Office flaw with fileless XWorm RAT to evade detection
Fortinet researchers have disclosed a new phishing campaign delivering the commercially available XWorm malware, chaining a years-old Microsoft Office vulnerability with fileless…
Palo Alto closes privileged access gap with $25B CyberArk acquisition
Cybersecurity company Palo Alto Networks has completed its $25 billion acquisition of Israel-based identity security firm CyberArk, bringing privileged access and identity…
The ephemeral infrastructure paradox: Why short-lived systems need stronger identity governance
In my experience leading engineering projects, I have encountered the same pattern repeatedly. We obsess over deployment speed. We measure success in…
What CISOs need to know about the OpenClaw security nightmare
The new personal AI agent orchestration tool known as OpenClaw — formerly Clawdbot, then Moltbot — is a personal assistant that can…
Entwickler werden zum Angriffsvektor
Softwareentwickler sind gefragt – auch unter kriminellen Hackern. Gorodenkoff | shutterstock.com Statt einfach “nur” Fehler in Applikationen auszunutzen, entdecken kriminelle Hacker zunehmend…