Cyberattacks on Humanitarian Orgs Jump Worldwide

These groups suffered three times the cyberattacks as the year…

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware’s…

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released…

Why CISOs Must Align Business Objectives & Cybersecurity

This alignment makes a successful CISO, but creating the same…

CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk

Introduction: Security at a Tipping Point Security Operations Centers (SOCs)…

State-Sponsored Groups Intensify Attacks on Manufacturing Sector and OT Systems

The manufacturing sector has emerged as a prime target for…

Erodiert die Security-Reputation der USA?

Trump stiftet Verunsicherung – auch wenn’s um Cybersicherheit geht. Joshua…

ISPConfig Vulnerability Allows Privilege Escalation to Superadmin and PHP Code Injection Exploit

A critical security vulnerability has been identified in ISPConfig version…

Zscaler to Acquire Red Canary, Enhancing AI-Powered Security Operations

Zscaler, Inc. (NASDAQ: ZS), the global leader in cloud security,…

Malaysian Airport’s Cyber Disruption a Warning for Asia

Transportation facilities and networks slowly adapt to changes and threats,…

GitHub-Hosted Malware Infects 1M Windows Users

Microsoft has identified a complex, malvertising-based attack chain that delivered Lumma and other infostealers to enterprise and consumer PC users; the campaign is unlikely the […]