The start of a new year means a fresh start for everyone, including cybersecurity teams. With budgets and plans now finalized, it’s…
News
Schrödinger’s cat and the enterprise security paradox
Most security leaders quietly live with a paradox they rarely name out loud. Until you truly look inside the box of your…
Gartner-Prognose: Die sechs wichtigsten Cybersicherheits-Trends für 2026
Lesen Sie, mit welchen Cybersecurity-Trends sich Unternehmen in diesem Jahr beschäftigen sollten. Who is Danny – shutterstock.com Auch im Jahr 2026 bleibt…
NIS2: Supply chains as a risk factor
Many companies today invest significant resources to secure their internal IT. Firewalls, monitoring, incident response plans, and awareness programs are well-established. At the…
Behörden warnen vor Hackerangriffen auf Politik und Militär
Cyberkriminelle haben es auf Signal-Konten von deutschen Politikern, Soldaten, Diplomaten und Journalisten abgesehen. nikkimeel – shutterstock.com Mit gefälschten Chatnachrichten vor allem im…
Software developers: Prime cyber targets and a rising risk vector for CISOs
Threats against corporate software developers are increasing and diversifying, challenging security leaders to develop more agile defenses against this growing attack vector….
Six more vulnerabilities found in n8n automation platform
Six more vulnerabilities have been discovered in the n8n workflow platform used for building LLM-powered agents to connect business processes. Four of…
Identity Management and Information Security News for the Week of February 6th: Semperis, Fingerprint, Cyberhaven, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
Claude AI finds 500 high-severity software vulnerabilities
Anthropic only released its latest large language model, Claude Opus 4.6, on Thursday, but it has already been using it behind the…
Pretend Disk Format: PDFs harbor new dangers
A particularly insidious phishing campaign is disguising malware pretending to be ordinary PDF documents behind links to virtual hard disks. Because workers…