Teams, Slack & Co. absichern: So wird das Collaboration-Tool kein...
Collaboration Tools wie Microsoft Teams und Slack erleichtern die Zusammenarbeit mit internen und externen Partnern enorm, bergen jedoch auch Risiken. Foto: Ascannio – shutterstock.comSchnelle und...
View ArticleMicrosoft Authenticator passkey support to be native in January
Microsoft has positioned itself as a strong convert to passkeys, with a promise to deliver passkey support in its Microsoft Authenticator app in mid-January 2025. Even though all enterprises will have...
View ArticleKicking dependency: Why cybersecurity needs a better model for handling OSS...
Most cybersecurity professionals are accustomed by now to the widespread adoption of open-source software (OSS) and the ever-growing threat of software supply chain attacks that target the OSS...
View ArticleSecurity associations CISOs should know about
Security organizations help CISOs gain valuable industry certifications, tap into peer insights, stay in touch with changing technology, and offer networking opportunities. Here are some CISOs can...
View ArticleNokia-Daten im Darknet aufgetaucht
In einem Hackerforum werden Quellcode und andere sensible Daten von Nokia zum Verkauf angeboten.JRdes – Shutterstock.com Der bekannte Bedrohungsakteur IntelBroker behauptet in einem Hackerforum, an...
View ArticleWas your last DocuSign-ed bill legitimate? Check again
Threat actors are abusing the APIs of trusted e-signing services platform DocuSign to send out convincing invoices in a new phishing campaign. In a research published this week, Cybersecurity firm,...
View ArticleSchneider Electric suffers data breach, exposing critical project and user data
A hacker group known as “Grep” has reportedly infiltrated Schneider Electric’s internal project tracking system, stealing about 40 GB of data in the latest cyberattack targeting the French...
View ArticleWie Hacker ML für Angriffe nutzen
srcset="https://b2b-contenthub.com/wp-content/uploads/2024/11/shutterstock_1255043227.jpg?quality=50&strip=all 4500w,...
View ArticleFive-country attack on cybercrooks welcomed by security expert
The revelation this week that an international operation took down thousands of malicious IP addresses is good news, says a cybersecurity expert, but the better news is the arrest of 41 suspects....
View ArticleDDoS attacks: Definition, examples, techniques, and how to defend them
What is a DDoS attack? A distributed denial of service (DDoS) attack is when an attacker, or attackers, attempt to make it impossible for a digital service to be delivered. This could be sending a web...
View ArticleTop 5 security mistakes software developers make
Creating and enforcing the best security practices for application development teams isn’t easy. Software developers don’t necessarily write their code with these in mind, and as the appdev landscape...
View ArticleInfostealers are using BYOVD to steal critical system data
Threat actors are dropping a new info-stealer on Windows systems that uses the bring your own vulnerable driver (BYOVD) technique to extract victims’ browser data, software details, and credit card...
View ArticleInterpol nimmt 22.000 IP-Adressen vom Netz
Interpol In einer konzentrierten Polizeiaktion hat Interpol zusammen mit mehreren privatwirtschaftlichen Partnern und Strafverfolgungsbehörden aus 95 Interpol-Mitgliedsländern der Cybercrime-Szene mal...
View ArticleBeware malicious NPM packages, Checkmarx warns
Application testing company Checkmarx has warned developers to be on the lookout for malicious NPM packages, after discovering a new attack that employs typosquatting to impersonate two popular...
View ArticleWhy AI is the final missing piece of the CNAPP puzzle
Cloud security teams are facing a growing number of risks due to the complex and dynamic nature of cloud environments. Prioritizing and remediating these vulnerabilities and misconfigurations before...
View ArticleCisco IoT wireless access points hit by severe command injection flaw
Cisco’s Ultra-Reliable Wireless Backhaul (URWB) hardware has been hit with a hard-to-ignore flaw that could allow attackers to hijack the access points’ web interface using a crafted HTTP request....
View ArticleThe US Department of Defense has finalized cyber rules for its suppliers
A new rule by the US Department of Defense to ensure that contractors and subcontractors are implementing information security measures required by the federal government is set to take effect 60 days...
View ArticleChoosing AI: the 7 categories cybersecurity decision-makers need to understand
Most of the chatter about artificial intelligence (AI) in cybersecurity concerns the technology’s use in augmenting and automating the traditional functional tasks of attackers and defenders, like how...
View ArticleUS consumer protection agency bans employee mobile calls amid Chinese hack fears
The US Consumer Financial Protection Bureau (CFPB) has issued an urgent directive barring employees and contractors from using mobile phones for work-related calls, following a major breach in US...
View ArticleRansomware-Attacke auf bayerische Schulen
Hacker sind in die IT-Systeme von sieben bayerischen Schulen eingedrungen. CeltStudio – Shutterstock.com Bereits im Oktober wurden sieben weiterführenden Bildungseinrichtungen im Landkreis Kitzingen...
View Article