The recently compromised update mechanism for the popular open source text editor Notepad ++ has been hardened so it’s now ‘effectively unexploitable’,…
News
Chinese hackers exploited zero-day Dell RecoverPoint flaw for 1.5 years
For the past 18 months, a Chinese cyberespionage group has been exploiting a prevously unknown vulnerability in Dell’s RecoverPoint for Virtual Machines,…
Millionen Chrome-Erweiterungen geben Browserverlauf preis
width=”2489″ height=”1400″ sizes=”auto, (max-width: 2489px) 100vw, 2489px”>Eine Sicherheitslücke in beliebten Chrome-Erweiterungen führt dazu, dass der Browserverlauf der Anwender offengelegt ist. 2lttgamingroom –…
Flaws in four popular VS Code extensions left 128 million installs open to attack
Critical and high-severity vulnerabilities were found in four widely used Visual Studio Code extensions with a combined 128 million downloads, exposing developers…
Keenadu: Android malware that comes preinstalled and can’t be removed by users
There’s too little a user can do when hit with a complex Android malware that comes preinstalled on their new smartphone or…
Cyberangriff auf Bahn stört Auskunftssysteme
Der Angriff konnte zurückgeschlagen werden. Trotzdem mussten Reisende mit Einschränkungen leben. Deutsche Bahn AG/Volker Emersleben Die Störungen der Auskunfts- und Buchungssysteme der…
Discipline is the new power move in cybersecurity leadership
For years, I was fortunate to live many years, earning enough budget to deploy cybersecurity programs. I worked the same playbook: run…
A new approach for GenAI risk protection
When generative AI (GenAI) hit the consumer market with the release of OpenAI’s ChatGPT, users worldwide flocked to the product and started…
The new paradigm for raising up secure software engineers
CISOs were already struggling to help developers keep up with secure code principles at the speed of DevOps. Now, with AI-assisted development…
13 Fragen gegen Drittanbieterrisiken
Drum prüfe… Miljan Zivkovic | shutterstock.com Die zunehmende Abhängigkeit von IT-Dienstleistern und Software von Drittanbietern vergrößert die Angriffsfläche von Unternehmen erheblich. Das…