I have stared at enough scanner dashboards to recognize the pattern. SAST flags theoretical flaws that never execute. DAST shrugs because the…
News
Top 10 vendors for AI-enabled security — according to CISOs
Venture capital may be flowing to trendy AI security startups, but battle-tested CISOs seem to be sticking with tried-and-true, name-brand technology partners…
Notorious BreachForums hacking site hit by ‘doomsday’ leak of 324,000 criminal users
Prominent crime forum BreachForums has suffered a new and possibly fatal blow to its reputation after the revelation that a database of…
Shai-Hulud & Co.: Die Supply Chain als Achillesferse
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?quality=50&strip=all 4096w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=444%2C250&quality=50&strip=all 444w”…
What to Expect from the Solutions Spotlight with Pathlock on February 12th, 2026
Solutions Review’s Solution Spotlight with Pathlock is part of an exclusive webinar series for enterprise business software users. This event will walk…
Malicious npm packages target the n8n automation platform in a supply chain attack
Threat actors were spotted weaponizing the n8n automation ecosystem this week, slipping malicious npm packages into its marketplace of community-maintained nodes. The…
Iran-linked MuddyWater APT deploys Rust-based implant in latest campaign
Iran-linked advanced persistent threat group MuddyWater has deployed a Rust-based implant in an ongoing espionage campaign targeting organizations in Israel and other…
Dobrindt: Mehr Kooperation mit Israel für Sicherheit Deutschlands
Deutschland und Israel haben einen Cyber- und Sicherheitspakt geschlossen. ekavector – shutterstock.com Angesichts der wachsenden Gefahr von Angriffen will die Bundesrepublik ihre…
CISOs’ top 10 cybersecurity priorities for 2026
Cybersecurity threats are becoming more sophisticated, more automated, and more intelligent, as well as harder to detect. At the same time the…
SBOM erklärt: Was ist eine Software Bill of Materials?
Softwareentwicklung und Autoproduktion haben mehr gemein, als man denkt. Lesen Sie, was Sie zum Thema Software Bill of Materials (SBOM) wissen sollten….