10 Kennzahlen, die CISOs weiterbringen

Geht es um Security-Kennzahlen, sollten CISOs sich auf das Wesentliche…

Fake resumes targeting HR managers now come with updated backdoor

CISOs should warn HR staff not to be fooled by…

‘Venom Spider’ Targets Hiring Managers in Phishing Scheme

Researchers from Arctic Wolf Labs detailed a new spear-phishing campaign…

AI Domination: RSAC 2025 Social Media Roundup

Documented in a series of social media posts, cybersecurity experts…

Warning issued to retailers’ CISOs worldwide after three attacks in UK

CISOs at retailers around the world should be tightening their…

Google ‘ImageRunner’ Bug Enabled Privilege Escalation

Tenable released details of a Google Cloud Run flaw that…

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing…

Top 11 Passwordless Authentication Tools – 2025

Passwordless authentication tools are revolutionizing digital security by eliminating the…

Kritische Zero-Day-Schwachstelle in SAP NetWeaver

width="1888" height="1062" sizes="(max-width: 1888px) 100vw, 1888px">Hacker könnten über eine Schwachstelle…

How to Automate CVE and Vulnerability Advisory Response with Tines

Run by the team at workflow orchestration and AI platform…

Top 5 Cybersecurity News Articles for the Week of January 5, 2025

As we kick off 2025, the cybersecurity landscape is already presenting new challenges and developments that professionals need to be aware of. Here’s a roundup […]