The recent SalesLoft Drift breaches revealed an uncomfortable truth that keeps me up at night, and should keep every CISO awake, too….
News
6 hot cybersecurity trends
It may be hard to believe, but ChatGPT, which brought generative AI to the masses and triggered an explosion of enterprise interest,…
OT-Security: Warum der Blick auf Open Source lohnt
Auch im OT-Security-Bereich stellen Open-Source-Lösungen eine kostengünstige Alternative zu kommerziellen Tools dar. MY STOCKERS – Shutterstock.com OT-Security als strategischer Erfolgsfaktor Die zunehmende…
Patch Tuesday priorities: Vulnerabilities in SAP NetWeaver and Microsoft NTLM and Hyper-V
CISOs with SAP NetWeaver AS Java servers in their environments should make sure admins patch two highly critical vulnerabilities as soon as…
Smart GPUGate malware exploits GitHub and Google Ads for evasive targeting
Security researchers at Arctic Wolf have uncovered a novel malware campaign targeting users in Western Europe, delivered through Google Ads and employing…
Phishing kit Salty2FA washes away confidence in MFA
A newly uncovered phishing campaign has been linked to Salty2FA, a phishing-as-a-service framework built to sidestep multi-factor authentication (MFA). The ongoing campaign…
GitHub Actions missbraucht
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_177668495.jpg?quality=50&strip=all 3540w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_177668495.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_177668495.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_177668495.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_177668495.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_177668495.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_177668495.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_177668495.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_177668495.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_177668495.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_177668495.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Massive npm supply chain attack hits 18 popular packages with 2B weekly downloads
A massive supply chain attack compromised 18 highly popular npm packages, which collectively received two billion weekly downloads, deploying sophisticated browser-based malware…
When AI nukes your database: The dark side of vibe coding
One July morning, a startup founder watched in horror as their production database vanished, nuked not by a hacker, but by a…
71% of CISOs hit with third-party security incident this year
Many enterprises are at growing risk due to immature supply chain cybersecurity practices and outdated strategies. The majority (71%) of organizations experienced…