width=”2490″ height=”1400″ sizes=”(max-width: 2490px) 100vw, 2490px”>Die Gefahr ist noch nicht gebannt: Experten verzeichnen weiter steigende Infektionszahlen. Ascannio – shutterstock.com Deutsche Unternehmen, Behörden und Bildungseinrichtungen sind […]
Category: Cyber Security News
Summer: Why cybersecurity must be strengthened as vacations abound
Summer is a time for vacation and a well-deserved break from the intensity of work. It’s also a great time to be targeted for a […]
Microsoft Upgrades .NET Bounty Program, Offers Rewards Up to $40,000
Microsoft has announced significant enhancements to its .NET Bounty Program, introducing expanded coverage, streamlined award structures, and substantially increased financial incentives for security researchers. The […]
Hackers Abuse EDR Free Trials to Bypass Endpoint Protection
Cybersecurity researchers have uncovered a concerning new attack vector where threat actors are exploiting free trials of endpoint detection and response (EDR) software to disable […]
CISA Releases Thorium: Open-Source Malware and Forensics Tool Now Public
The Cybersecurity and Infrastructure Security Agency (CISA) has made a significant contribution to the cybersecurity community by publicly releasing Thorium, a powerful open-source platform designed […]
Over 17,000 SharePoint Servers Found Exposed Online — 840 Vulnerable to Active 0-Day Attacks
A significant cybersecurity crisis has emerged with the discovery of over 17,000 Microsoft SharePoint servers exposed to internet-based attacks, including 840 systems vulnerable to a […]
SentinelLabs uncovers China’s hidden cyber-espionage arsenal
A number of patents have been granted to companies in the People’s Republic of China (PRC) involving “highly intrusive forensics and data collection technologies” that […]
Customer Identity & Access Management: Die besten CIAM-Tools
Wir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt. Jackie Niam | shutterstock.com Customer Identity & Access Management (CIAM) […]
How bright are AI agents? Not very, recent reports suggest
Security researchers are adding more weight to a truth that infosec pros had already grasped: AI agents are not very bright, and are easily tricked […]
Attackers wrap phishing links through URL scanning services to bypass detection
Attackers are exploiting the URL wrapping practices of email security services to conceal phishing links and lend credibility to their malicious campaigns. Email security services […]