Security researchers have uncovered a Vietnamese threat group evolving from their custom PXA Stealer campaign into a multi-layered delivery chain dropping PureRAT,…
News
AI coding assistants amplify deeper cybersecurity risks
The productivity improvements that arise from increasing use of AI coding tools are coming at the cost of greater security risks. While…
Die besten Cyber-Recovery-Lösungen
Nicht greifende Recovery-Prozesse sind für Unternehmen ein Albtraumszenario, das dank ausgefeilter Angriffe immer öfter zur Realität wird. Arjuna Kodisinghe | shutterstock.com Im…
Chinese spies had year-long access to US tech and legal firms
Chinese threat actors deployed a custom Linux backdoor on compromised network edge devices to maintain persistent access into the networks of US…
Macs go phishing as GitHub impostors drop Atomic stealer
In an active, large-scale campaign, attackers are posing as legitimate brands on GitHub Pages to target macOS users with the data-skimming “Atomic”…
What I learned extending zero trust to the storage layer
When I first started thinking seriously about applying zero trust principles to the storage layer, it wasn’t because of some white paper…
Nach Cyberangriff: IT-Störung in Hoppegarten dauert an
Der Cyberangriff auf die Gemeinde Hoppegarten im August sorgt aktuell noch immer für IT-Probleme. Vectors Bang – shutterstock.com Am 10. August funktionierte…
Allianz: Cyberabwehr hilft – Hacker suchen leichtere Beute
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2655961529.jpg?quality=50&strip=all 9504w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2655961529.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2655961529.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2655961529.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2655961529.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2655961529.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2655961529.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2655961529.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2655961529.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2655961529.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/09/shutterstock_2655961529.jpg?resize=444%2C250&quality=50&strip=all 444w”…
5 questions CISOs should ask vendors
Phone, emails, and LinkedIn messages — CISOs are flooded with vendors pitching their security products. Outreach attempts can be up to 30…
Application Security Posture Management – ein Kaufratgeber
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/09/Gorodenkoff_shutterstock_2288178559_16z9.jpg?quality=50&strip=all 7200w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Gorodenkoff_shutterstock_2288178559_16z9.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Gorodenkoff_shutterstock_2288178559_16z9.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Gorodenkoff_shutterstock_2288178559_16z9.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Gorodenkoff_shutterstock_2288178559_16z9.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Gorodenkoff_shutterstock_2288178559_16z9.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Gorodenkoff_shutterstock_2288178559_16z9.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Gorodenkoff_shutterstock_2288178559_16z9.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Gorodenkoff_shutterstock_2288178559_16z9.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Gorodenkoff_shutterstock_2288178559_16z9.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/09/Gorodenkoff_shutterstock_2288178559_16z9.jpg?resize=444%2C250&quality=50&strip=all 444w”…