IBM is urging customers to quickly patch a critical vulnerability in its API Connect platform that could allow remote attackers to bypass…
News
Equifax Europe CISO: Notorious breach spurred cybersecurity transformation
The 2017 Equifax breach was one of biggest security incidents of the 21st century. A textbook data leak case, the breach impacted more than 147…
Daran scheitert Passwordless
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?quality=50&strip=all 8256w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/11/Roman-Samborskyi_shutterstock_2425433469_16z9.jpg?resize=444%2C250&quality=50&strip=all 444w”…
Cybercrime Inc.: Wenn Hacker besser organsiert sind als die IT
Cybercrime hat sich zur organisierten Industrie mit Arbeitsteilung gewandelt. DC Studio – Shutterstock.com Was einst in Foren mit selbstgeschriebenen Schadcodes begann, hat…
So geht Post-Incident Review
Post-Incident Reviews können dazu beitragen, die richtigen Lehren aus Sicherheitsvorfällen zu ziehen – wenn sie richtig aufgesetzt sind. dotshock | shutterstock.com Angenommen,…
6 cyber insurance gotchas security leaders must avoid
Facing ever-mounting cyberthreats, enterprises are increasingly turning to cyber insurance to address the potentially severe financial damage a successful attack can inflict….
Patch Tuesday 2025 roundup: The biggest Microsoft vulnerabilities of the year
Every day has the potential to be a bad day for a CSO. However, the second Tuesday of each month – Patch…
Sieben Anzeichen dafür, dass Ihr Cybersecurity-Framework überarbeitet werden muss
Cybersecurity ist kein Nice-to-have, sondern ein Muss. Dennoch vernachlässigen immer noch zu viele Unternehmen seine Pflege. Summit Art Creations – shutterstock.com Cybersicherheits-Frameworks…
React2Shell: Anatomy of a max-severity flaw that sent shockwaves through the web
The React 19 library for building application interfaces was hit with a remote code vulnerability, React2Shell, about a month ago. However, as researchers delve…
Top 5 real-world AI security threats revealed in 2025
The year of agentic AI came with promises of massive productivity gains for businesses, but the rush to adopt new tools and…