Wir haben die besten Lösungen in Sachen Customer Identity & Access Management für Sie zusammengestellt. Jackie Niam | shutterstock.com Customer Identity & Access Management (CIAM) […]
SentinelLabs uncovers China’s hidden cyber-espionage arsenal
A number of patents have been granted to companies in the People’s Republic of China (PRC) involving “highly intrusive forensics and data collection technologies” that […]
Attackers wrap phishing links through URL scanning services to bypass detection
Attackers are exploiting the URL wrapping practices of email security services to conceal phishing links and lend credibility to their malicious campaigns. Email security services […]
Gen Z Falls for Scams 2x More Than Older Generations
Forget gullible old people — Gen Z is the most at-risk age group on the Web. Older folks might want to ignore it, but employers […]
SafePay Claims Ingram Micro Breach, Sets Ransom Deadline
The ransomware gang claims to have stolen 3.5TB of data, and told the technology distributor to pay up or suffer a data breach. The original […]
DragonForce Ransom Cartel Profits Off Rivals’ Demise
The fall of RansomHub led to a major consolidation of the ransomware ecosystem last quarter, which was a boon for the DragonForce and Qilin gangs. […]
Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies
The Russian nation-state threat actor known as Secret Blizzard has been observed orchestrating a new cyber espionage campaign targeting foreign embassies located in Moscow by […]
Anubis Ransomware Targets Android and Windows Users to Encrypt Files and Steal Credentials
Ransomware activity has skyrocketed in the ever-evolving cyber threat landscape, with Bitsight’s State of the Underground 2025 study indicating a 53% increase in ransomware group-operated […]
Threat Actors Use Malicious RMM Tools for Stealthy Initial Access to Organizations
A small increase in targeted cyberattacks that make use of Remote Monitoring and Management (RMM) capabilities that are embedded in PDF documents has been seen […]
Unit 42 Launches Attribution Framework to Classify Threat Actors by Behavior and Activity
Unit 42, the threat research division of Palo Alto Networks, has unveiled its Attribution Framework, designed to transform the traditionally subjective process of threat actor […]