News

Letting your guard down is not the most reasonable thing to do at a time when cybersecurity risks are on the rise; cyber attackers are not resting. What's more, they are well aware of what happens at ...
Recipients of rogue emails may be more likely to click on wrapped links, assuming they’ve been vetted by security services.
Anfang Juli 2025 wurde bekannt, dass der IT-Dienstleister Ingram Micro von einer Ransomware-Attacke betroffen ist. Diese zog ...
A surge in infostealers, delayed vulnerability disclosures, and record ransomware attacks is overwhelming defenders, ...
Researchers reveal how attackers exploit free trials of endpoint detection tools to disable existing security software, even ...
Security executives may be prone to believing cyber defenses are stronger than front-line staff see them to be, thereby ...
Generative AI (GenAI) soll Daten und Infrastruktur vor ausgeklügelten Cyberbedrohungen schützen - soweit die Theorie. Doch ...
Security researchers are adding more weight to a truth that infosec pros had already grasped: AI agents are not very bright, ...
Mapping observed tooling back to a cluster may not actually represent the true organization structure of the attackers.” In his 15-page report, he noted that, earlier this month, the US Department of ...
Recent research into KEVs and CVEs shows that threat actors are capitalizing on flaws much more quickly, leaving defenders in ...
Palo Alto Networks greift richtig tief in die Tasche, um einen Fuß in die Identity-Management-Tür zu bekommen.
Die Analyse-Software des Unternehmens Palantir ist umstritten, einige Bundesländer nutzen sie. Ob sie auch bundesweit zum Einsatz kommt, ist noch nicht entschieden.