The threat actor known as Dragon Breath has been observed making use of a multi-stage loader codenamed RONINGLOADER to deliver a modified variant of a […]
Author: cyberbytes
India’s new data privacy rules turn privacy compliance into an engineering challenge
India has notified its Digital Personal Data Protection (DPDP) Rules, 2025, introducing strict consent and data retention requirements that will force large digital platforms and […]
North Korea’s ‘Job Test’ trap upgrades to JSON malware dropboxes
North Korea-linked Contagious Interview campaign is now luring developers with trojanized coding tasks and pulling obfuscated payloads from public JSON-storage services like JSON Keeper, JSONSilo, […]
Gipfel in Berlin – Europa strebt digitale Souveränität an
Am 18. November 2025 findet der Summit on European Digital Sovereignty in Berlin statt. mr_tigga – shutterstock.com Bundeskanzler Friedrich Merz (CDU) und Frankreichs Präsident, Emmanuel Macron, […]
The rise of the chief trust officer: Where does the CISO fit?
CISOs may soon find themselves operating alongside a new colleague, the chief trust officer, as more organizations elevate trust as a business differentiator. With breaches, […]
Spam flooding npm registry with token stealers still isn’t under control
A coordinated token farming campaign continues to flood the open source npm registry, with tens of thousands of infected packages created almost daily to steal […]
Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time
Google has disclosed that the company’s continued adoption of the Rust programming language in Android has resulted in the number of memory safety vulnerabilities falling […]
ISO and ISMS: 9 reasons security certifications go wrong
ISO certifications, as well as the implementation of an Information Security Management System (ISMS) based on IT baseline protection standards, are seen by many companies as […]
Empathie trifft IT-Sicherheit: Der Weg zu gelebter Compliance
CISOs sollten Sicherheitsrichtlinien mit Blick auf die Belegschaft gestalten. earthphotostock – shutterstock.com In vielen Unternehmen stoßen IT-Sicherheitsrichtlinien auf Widerstand, da Mitarbeitende sie als hinderlich oder […]
Microsoft Patch Tuesday, November 2025 Edition
Microsoft this week pushed security updates to fix more than 60 vulnerabilities in its Windows operating systems and supported software, including at least one zero-day […]