Merger and acquisition due diligence typically focuses on financials, legal risks, and operational efficiencies. Cybersecurity is often an afterthought — and that’s a problem. ​The […]
NIST’s ‘LEV’ Equation to Determine Likelihood a Bug Was Exploited
A new equation introduced by the National Institute of Standards and Technology (NIST) aims to offer a mathematical likelihood that a vulnerability has been exploited […]
Windows 11 Introduces Enhanced Administrator Protection to Strengthen Security Against Elevated Privilege Attacks
Microsoft has unveiled Administrator Protection, a groundbreaking security feature for Windows 11 designed to safeguard systems against privilege escalation attacks. This new capability creates a […]
New Scan Uncovers 150K Industrial Systems Worldwide Vulnerable to Cyberattacks
A groundbreaking study leveraging advanced application-layer scanning has exposed approximately 150,000 industrial control systems (ICS) worldwide that are directly accessible on the public internet, posing […]
Critical flaw in OpenPGP.js raises alarms for encrypted email services
A newly discovered flaw in OpenPGP.js, a JavaScript cryptography library used by services like Proton Mail, could allow attackers to spoof messages that appear securely […]
Ransomware-Bande BlackBasta hat neuen Malware-Favoriten
Die BlackBasta-Bande scheint ihr Repertoire um eine neue, modulare Malware erweitert zu haben. In einem LinkedIn-Post gaben Forscher des Cybersicherheitsunternehmens Prodaft an, dass die berüchtigte […]
PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms
Russian organizations have become the target of a phishing campaign that distributes malware called PureRAT, according to new findings from Kaspersky. “The campaign aimed at […]
Cyberangriff auf Arla Deutschland
Das deutsche Arla-Werk in Upahl wurde von Cyberkriminellen angegriffen. Arla Foods Deutschland Arla Foods mit Hauptsitz in Dänemark zählt weltweit zu den größten Molkereien. Berichten […]
The Day I Found an APT Group In the Most Unlikely Place
Dark Reading Confidential Episode 6: Cyber researchers Ismael Valenzuela and Vitor Ventura share riveting stories about the creative tricks they used to track down advanced […]
Securing CI/CD workflows with Wazuh
Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to practices that automate how code is developed and released to different environments. CI/CD pipelines are fundamental in […]