Lesen Sie, worauf es beim Darknet-Monitoring ankommt und welche Tools dafür am besten geeignet sind. Foto: sashk0 – shutterstock.com Das Dark Web…
News
New Rowhammer technique against DDR5 achieves privilege escalation
Researchers have devised a new technique to trigger Rowhammer bit flips inside the memory cells of DDR5 RAM modules, which were believed…
WatchGuard patches ‘critical’ VPN flaw in firewalls that could lead to compromise
WatchGuard has patched a dangerous branch office and mobile VPN configuration vulnerability affecting nearly three dozen models of its current and legacy…
Meet ShadowLeak: ‘Impossible to detect’ data theft using AI
For years threat actors have used social engineering to trick employees into helping them steal corporate data. Now a cybersecurity firm has…
Palo Alto Networks acknowledges browser malware risks, validating SquareX’s LMR attack findings
SquareX’s research on Last Mile Reassembly (LMR) attacks, which the browser-native cybersecurity company disclosed at DEF CON 32, has finally received the…
Microsoft schaltet gefährliches Phishing-Netzwerk ab
Über die Phishing-as-a-Service-Plattform RaccoonO365 sollen mehr als 5.000 Microsoft-Accounts in 94 Ländern kompromittiert worden sein. janews – shutterstock.com Die Digital Crimes Unit…
Ransomware-Lage verschärft sich drastisch
Zscaler gewährt Einblicke in das globale Ransomware-Ökosystem. JLStock Der jährliche ThreatLabz Ransomware-Report (PDF) von Zscaler hält auch 2025 eher keine guten Nachrichten…
AI is altering entry-level cyber hiring — and the nature of the skills gap
Teamwork, problem-solving, and analytical thinking outrank core technical skills such as data security and cloud security as criteria for hiring entry-level cybersecurity…
Where CISOs need to see Splunk go next
This month Splunk brought its annual customer conference, .Conf, to Boston, with parent company Cisco along for the ride. As usual, .Conf…
Warning: Brute force attacks hitting SonicWall firewall configuration backups
SonicWall is warning admins that recent brute force attacks on its firewall’s API service for cloud backup could have exposed backup configuration…