The creation of an AI proof of concept that can autonomously build and execute a ransomware attack from scratch shouldn’t alarm CISOs…
News
Hackerangriff treibt Wehrle-Werk in Insolvenz
Die Wehrle-Werk AG hat kürzlich einen Insolvenzantrag gestellt. Ein Cyberangriff im vergangenen Jahr hat großen Schaden angerichtet. stockwerk-fotodesign – shutterstock.com Die Wehrle-Werk…
GhostAction campaign steals 3325 secrets in GitHub supply chain attack
GitGuardian has disclosed a new software supply chain attack campaign, dubbed GhostAction, that exfiltrated thousands of sensitive credentials before being detected and…
Is the CISO role broken?
A recent story by Tyler Farrar (The CISO code of conduct: Ditch the ego, lead for real) really got me thinking. While…
The importance of reviewing AI data centers’ policies
Investment into AI data center development is exponentially increasing: in June 2025, Amazon announced a $20 billion investment into AI data center…
10 security leadership career-killers — and how to avoid them
There are some bad behaviors that can get executives in trouble. Illegal and unethical actions are the most obvious, and they typically…
External Attack Surface Management (EASM): Mit diesen vier Schritten minimieren Sie das Cyberrisiko
IT-Security-Verantwortliche sollten die Angriffsfläche permanent analysieren und schützen. Dazu müssen sie stets im Blick haben, welche Assets über das Internet erreichbar sind….
Identity Management and Information Security News for the Week of September 5th: Keeper Security, 1Kosmos, Druva, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
Hacker nutzen gravierende Schwachstelle bei SAP S/4HANA aus
Ein Exploit für die Schwachstelle wurde bereits in freier Wildbahn beobachtet. Nitpicker / Shutterstock Vergangenen Monat hat SAP einen Patch für S/4HANA…
You should be aware of these latest social engineering trends
Instead of relying on advanced tools or complex scripts, experienced attackers penetrate systems and steal data using the most effective weapon of…