A critical security flaw in the GiveWP Donation Plugin tracked as CVE-2025-0912, has exposed over 100,000 WordPress websites to unauthenticated remote code execution (RCE) attacks. […]
Defending against USB drive attacks with Wazuh
USB drive attacks constitute a significant cybersecurity risk, taking advantage of the everyday use of USB devices to deliver malware and circumvent traditional network security […]
Why Security Leaders Are Opting for Consulting Gigs
Many CISOs are weighing the benefits of going virtual as a consultant. Can the pendulum swing in the other direction? ​  darkreading Read More
So werden PV-Anlagen digital angegriffen und geschützt
Unternehmen setzen vermehrt auf Solaranlagen mit Batteriespeichern, um hohe Energiekosten und Netzstabilitätsrisiken zu minimieren. Diese Systeme sind allerdings oft nicht gehärtet und damit ein immer […]
Polnische Raumfahrtbehörde kämpft mit Cyberattacke
Die polnische Raumfahrtbehörde POLSA wurde Ziel eines Cyberangriffs. BUTENKOV ALEKSEI – Shutterstock.com Wie die polnische Raumfahrtbehörde POLSA kürzlich über ihren X-Account mitteilte, ist es zu […]
China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access
The China-lined threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its tactics to target the […]
Microsoft Warns of Silk Typhoon Hackers Attacking IT Supply Chain
Microsoft Threat Intelligence has identified a significant shift in tactics by Silk Typhoon, a Chinese state-sponsored espionage group that has begun targeting common IT solutions […]
Ransomware goes postal: US healthcare firms receive fake extortion letters
In late February, healthcare organizations across the US started receiving extortion demands by mail claiming that their organization’s data had been stolen in a ransomware […]
Bogus ‘BianLian’ Gang Sends Snail-Mail Extortion Letters
The letters mimic typical ransom notes and threaten to delete or leak compromised data if payments aren’t made, though none of the organizations that received […]
Microsoft To Harden The Trust Boundary of VBS Enclaves
Microsoft has recently published comprehensive guidance for developers working with Virtualization-Based Security (VBS) enclaves, highlighting critical security measures to strengthen the trust boundary between different […]