The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding a severe authentication vulnerability affecting Iskra iHUB and iHUB Lite intelligent metering […]
How CISOs can prepare for the new era of short-lived TLS certificates
For years, organizations used SSL/TLS certificates with long lifespans, reviewing and renewing them only occasionally. That is about to change. On 15 March 2026, the […]
Water Saci Hackers Exploit AI Tools to Target WhatsApp Web Users
The Water Saci campaign targeting Brazilian users has escalated significantly, with threat actors demonstrating remarkable technical sophistication by employing artificial intelligence to enhance their malware […]
Cybersicherheit für viele Nebensache
Laut einer Umfrage informieren sich lediglich 54 Prozent der Deutschen regelmäßig über das Thema Cybersicherheit. Summit Art Creations – shutterstock.com Fake-Shops, Datendiebstahl, gefälschte Angebote auf […]
New Raptor Framework Uses Agentic Workflows to Create Patches
Researchers utilized prompts and large language models to develop an open-source AI framework capable of generating both vulnerability exploits and patches. ​The original article found […]
While ECH Adoption Is Low, Risks Remain for Enterprises, End Users
Is the new privacy protocol helping malicious actors more than Internet users? ​The original article found on darkreading Read More
Chrome 143 Update Patches 13 Security Vulnerabilities Allowing Arbitrary Code Execution
Google has released Chrome 143 to the stable channel, addressing 13 security vulnerabilities that could allow attackers to execute arbitrary code on affected systems. The […]
BPFDoor and Symbiote: Advanced eBPF-Based Rootkits Target Linux Systems
Extended Berkeley Packet Filter (eBPF) represents one of Linux’s most powerful kernel technologies, enabling users to load sandboxed programs directly into the kernel for network […]
Security-Tools für KI-Infrastrukturen – ein Kaufratgeber
Tools, die die KI-Infrastruktur unter die Lupe nehmen, optimieren und absichern, liegen im Trend. Unser Ratgeber führt Sie zur richtigen AI-Security-Posture-Management-Lösung. Julien Tromeur | shutterstock.com […]
China Researches Ways to Disrupt Satellite Internet
While satellite constellations — such as Starlink — are resilient, 2,000 drones could cut communications to a region the size of Taiwan, researchers find. ​The original […]