Eight critical vulnerabilities and an actively exploited zero day highlight Microsoft’s first Patch Tuesday announcements for 2026. Most of the higher scoring…
News
Cybersecurity risk will accelerate this year, fueled in part by AI, says World Economic Forum
Cybersecurity risk will accelerate this year, fueled by advances in AI, deepening geopolitical fragmentation and the complexity of supply chains, the World…
Ransomware-Banden erpressen Opfer mit Compliance-Verstößen
Ransomware-Gruppen setzen ihre Opfer vermehrt mit Compliance-Verstößen unter Druck. Digitala World – shutterstock.com Ransomware-Attacken zählen nach wie vor zu den häufigsten Angriffsmethoden….
High-severity bug in Broadcom software enables easy WiFi denial-of-service
A high-severity flaw in Broadcom WiFi chipset software can allow an attacker within radio range to completely knock wireless networks offline by…
For application security: SCA, SAST, DAST and MAST. What next?
I have stared at enough scanner dashboards to recognize the pattern. SAST flags theoretical flaws that never execute. DAST shrugs because the…
Top 10 vendors for AI-enabled security — according to CISOs
Venture capital may be flowing to trendy AI security startups, but battle-tested CISOs seem to be sticking with tried-and-true, name-brand technology partners…
Notorious BreachForums hacking site hit by ‘doomsday’ leak of 324,000 criminal users
Prominent crime forum BreachForums has suffered a new and possibly fatal blow to its reputation after the revelation that a database of…
Shai-Hulud & Co.: Die Supply Chain als Achillesferse
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?quality=50&strip=all 4096w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2094512128.jpg?resize=444%2C250&quality=50&strip=all 444w”…
What to Expect from the Solutions Spotlight with Pathlock on February 12th, 2026
Solutions Review’s Solution Spotlight with Pathlock is part of an exclusive webinar series for enterprise business software users. This event will walk…
Malicious npm packages target the n8n automation platform in a supply chain attack
Threat actors were spotted weaponizing the n8n automation ecosystem this week, slipping malicious npm packages into its marketplace of community-maintained nodes. The…