So schützen Zugriffskontrollen vor Ransomware

loading="lazy" width="400px">Um sich vor Ransomware-Angriffen zu schützen, sollten Unternehmen ihre…

Top-Tipps für die erfolgreiche Nutzung von Bedrohungsdaten

Mit STIX und TAXII werden Bedrohungsdaten nicht nur übertragen, sondern…

NSO Group’s Legal Loss May Do Little to Curtail Spyware

The $168 million judgment against NSO Group underscores how citizens…

Attackers Lace Fake Generative AI Tools With ‘Noodlophile’ Malware

Threat actors are scamming users by advertising legitimate-looking generative AI…

New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms

Cybercriminals have unleashed a new malware campaign using fake AI…

Threat Actor Tied to LockBit Ransomware Targets Fortinet Users

The Mora_001 group uses similar post-exploitation patterns and ransomware customization…

Arkana Ransomware Group Claims Compromise of US Telecom Companies

The largest US internet provider, WideOpenWest (WOW!), is allegedly compromised…

Cohesity-Veritas makes its pitch: Real-time cyberattack data recovery, AI analysis without the data lake

Cohesity, a data protection company, held its first press conference…

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in…

WordPress Plugin Vulnerability Exposes 200k+ Sites to Code Execution Attacks

A critical vulnerability in WP Ghost, a popular WordPress security…

12 Chinese Hackers Charged For Cyber Attacks on U.S Treasury

The U.S. Department of Justice (DOJ) unsealed indictments today against 12 Chinese nationals linked to state-sponsored cyber espionage campaigns targeting the U.S. Treasury Department, religious […]