A free, publicly accessible database for IT security vulnerabilities, the db.gcve.eu, has been created by GCVE (Global Cybersecurity Vulnerability Enumeration). The aim…
News
Secure web browsers for the enterprise compared: How to pick the right one
Web browsers have long been the security sinkhole of enterprise infrastructure. While email is often cited as the most common entry point,…
This Intune update isn’t optional — it’s a kill switch for outdated apps
Enterprises using Intune mobile application management (MAM) beware: Your apps won’t run soon if you haven’t planned ahead. Microsoft is updating its…
Mandiant pushes organizations to dump insecure NTLMv1 by releasing a way to crack it
Google’s Mandiant security division has come up with an unusual tactic to persuade organizations to stop using the aged and hugely insecure…
Neue EU-Schwachstellen-Datenbank gestartet
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?quality=50&strip=all 8960w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_2692564999.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Five Chrome extensions caught hijacking enterprise sessions
A coordinated campaign of malicious browser add-ons has bypassed Chrome Web Store’s defenses, weaponizing extensions advertised as productivity tools to steal corporate…
Python-Bibliotheken für Hugging-Face-Modelle vergiftet
Python-Libraries sind mit manipulierten Metadaten in KI-Modellen infiziert und können beim Laden Schadcode ausgeführen. Agus_Gatam – shutterstock NeMo, Uni2TS und FlexTok, Python-Bibliotheken…
The culture you can’t see is running your security operations
Here’s what nobody admits: Your firewall isn’t the problem. Your SIEM isn’t the problem. That shiny new EDR tool you just bought?…
Fahndung nach Kopf von Black Basta
srcset=”https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?quality=50&strip=all 3008w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2026/01/shutterstock_1415668481.jpg?resize=444%2C250&quality=50&strip=all 444w”…
From arts degree to cybersecurity: Rona Michele Spiegel brings fresh perspective to cyber leadership
Rona Michele Spiegel’s journey to cybersecurity might seem unconventional to some: She studied the arts. But as someone who grew up when…