ServiceNow is reportedly in advanced talks to acquire Veza, an identity security startup, for more than $1 billion. For ServiceNow customers deploying…
News
Neues ToddyCat-Toolkit greift Outlook und Microsoft-Token an
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2108335628.jpg?quality=50&strip=all 5760w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2108335628.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2108335628.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2108335628.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2108335628.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2108335628.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2108335628.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2108335628.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2108335628.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2108335628.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/11/shutterstock_2108335628.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Microsoft Teams’ guest chat feature exposes cross-tenant blind spot
A newly highlighted flaw in Microsoft’s cross-tenant collaboration model shows that once a user accepts a guest invitation in Teams, their Defender…
CSPM buyer’s guide: How to choose the best cloud security posture management tools
Cloud security posture management (CSPM) explained Cloud security posture management (CSPM) combines threat intelligence, detection, and remediation that works across complex collections…
Von LLM generierte Malware wird immer besser
Forscher tricksen Chatbots aus, stoßen aber auf unzuverlässige Ergebnisse. Ascannio / Shutterstock Cyberkriminelle versuchen bereits seit geraumer Zeit, mit Hilfe von Large…
SonicWall ransomware attacks offer an M&A lesson for CSOs
The recent ransomware attacks on organizations with SonicWall SSL VPNs may teach more lessons than just the need for patch management and…
AI browsers can be tricked with malicious prompts hidden in URL fragments
Researchers have demonstrated another indirect prompt injection attack against AI-powered browsers and browser assistants that could lead to phishing, sensitive data exfiltration,…
Neue ClickFix-Kampagne nutzt Fake-Windows-Updates
Cyberkriminelle nutzen eine gefälschte Windows-Update-Seite, um Mitarbeiter anzugreifen. PixieMe / Shutterstock Forscher des Security-Anbieters Huntress sind kürzlich auf eine neue ClickFix-Kampagne gestoßen,…
ToddyCat APT evolves to target Outlook archives and Microsoft 365 tokens
Attackers behind the ToddyCat advanced persistent threat (APT) toolkit have adapted to stealing Outlook mail data and Microsoft 365 Access tokens. According…
Alliances between ransomware groups tied to recent surge in cybercrime
A seasonal surge in malicious activity combined with alliances between ransomware groups led to a 41% increase in attacks between September and…