Russia-linked attackers are reportedly using a new Microsoft vulnerability as part of a coordinated espionage and malware campaign, Operation Neusploit. The campaign…
News
Hackerangriff auf Romina Mineralbrunnen
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2026/02/467510068_122131307660493869_19679345767413254_n.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″…
Zero trust in practice: A deep technical dive into going fully passwordless in hybrid enterprise environments
Over the past three years, I’ve led passwordless migration initiatives at three Fortune 500 companies, and I can tell you with confidence…
Cybercriminals set sites on identities
Eye Security’s 2026 State of Incident Response Report shows that cyberattacks on companies are increasingly going undetected, and the damage occurs within minutes….
Should I stay or should I go?
Even the most seasoned CISOs sometimes run into insurmountable roadblocks at their organizations. Despite their best efforts at building relationships, and even…
Cyberrisiko Ruhestand
Wenn OT-Fachkräfte in den Ruhestand gehen, droht ein massiver Wissensverlust. Das kann erhebliche Folgen für die Cybersicherheit haben. vectorfusionart – shutterstock.com Zwar…
Notepad++ infrastructure hijacked by Chinese APT in sophisticated supply chain attack
The popular open-source text editor Notepad++ was targeted in a sophisticated supply chain attack that allowed Chinese state-sponsored hackers to deliver malware…
Think agentic AI is hard to secure today? Just wait a few months
Early experimentation with agentic AI has given CISOs a preview of the possible cybersecurity nightmares ahead. But with autonomous agent adoption expected…
Shai-Hulud & Co.: The software supply chain as Achilles’ heel
Today’s applications are based on numerous components, each of which, along with the development environments themselves, represents an attack surface. Regardless of…
Was tun, wenn die Erpresser kommen?
Ruhe bewahren und keine übereilten Sachen machen, empfiehlt Podcast-Gast Joanna Lang-Recht. intersoft consulting services AG Montagmorgen, 8:00 Uhr. Die Mitarbeitenden können sich…