The UK’s Cyber Security and Resilience Bill will boost standards – and...
If you’re a UK enterprise, this might not be good news: extra investment by infrastructure providers to meet the demands of the government’s forthcoming Cyber Security and Resilience Bill is likely to...
View ArticleGoogle adds end-to-end email encryption to Gmail
Google has introduced a new end-to-end encryption (E2EE) feature in Gmail, enabling organizations to send encrypted emails that even Google cannot read to other Gmail users. Later this year, the...
View ArticleDas gehört in Ihr Security-Toolset
Lesen Sie, welche Werkzeuge essenziell sind, um Unternehmen gegen Cybergefahren abzusichern.Gorodenkoff | shutterstock.com Sicherheitsentscheider sind mit einer sich kontinuierlich verändernden...
View Article10 best practices for vulnerability management according to CISOs
It was 2003, and I was giving my first cybersecurity presentation at an industry conference in Chicago. I talked about the onslaught of worms and viruses at the time (MSBlast, SQLSlammer, etc.), and...
View ArticleMicrosoft takes first step toward passwordless future
Microsoft is looking to permanently abandon password-based user authentication, replacing it with a system that uses access keys and identity confirmation methods based on biometrics. According to a...
View ArticleOracle Health warnt vor Datenleck
width="2432" height="1368" sizes="(max-width: 2432px) 100vw, 2432px">Hacker haben sich Zugriff auf Daten von Oracle Health verschafft.Pincasso – shutterstock.com Während Oracle den Datenverstoß,...
View ArticleMalicious actors increasingly put privileged identity access to work across...
Abuse of legitimate privileged access is on the rise, accounting for the majority of security breaches last year, with stolen user identities being leveraged by malicious actors across various parts...
View ArticleGoogle fixes GCP flaw that could expose sensitive container images
A critical privilege escalation vulnerability, ImageRunner, affecting Google Cloud was promptly fixed before it could allow attackers to access sensitive information from GCP deployments. The issue,...
View ArticleMicrosoft’s AI tool catches critical GRUB2, U-boot bootloader flaws
Microsoft’s Threat Intelligence team has leveraged its AI-driven Security Copilot tool to identify 20 critical vulnerabilities in widely used open-source bootloaders — GRUB2, U-Boot, and Barebox....
View ArticleHacker stiehlt Kundendaten von Samsung Deutschland
Samsung Deutschland ist von einem Datenleck betroffen.Samsung Deutschland Bei Samsung Deutschland hat es offenbar ein massives Datenleck gegeben. Etwa 270.000 Kundendatensätze von Samsung Electronics...
View ArticleThreat-informed defense for operational technology: Moving from information...
As the threat landscape continues to evolve, critical infrastructure sectors face a growing wave of sophisticated cyber threats. Traditional security strategies that focus solely on indicators of...
View ArticleSolarWinds launches incident response tool, boosts AI in observability platform
SolarWinds this week introduced a new incident response product and announced AI-based updates to its observability platform and service management product that are aimed at strengthening IT...
View ArticleYears-old login credential leads to leak of 270,000 Samsung customer records
Samsung Germany has apparently suffered a massive data breach, with approximately 270,000 customer records currently being offered for sale on a dark web forum. A criminal hacker using the pseudonym...
View ArticleVeterans are an obvious fit for cybersecurity, but tailored support ensures...
With a bachelor’s degree in computer science, some cybersecurity work experience, and more than 20 years of US Army and National Guard service, Chris Elgee would seem perfectly positioned to easily...
View ArticleAI disinformation didn’t upend 2024 elections, but the threat is very real
The 2024 election cycle was widely feared to be a watershed moment when artificial intelligence fundamentally changed the disinformation battlefield as deepfake videos, AI-generated propaganda, and...
View ArticleHackerangriff auf Heilbronner Marketing
width="2421" height="1362" sizes="(max-width: 2421px) 100vw, 2421px">Hacker haben die IT-Systeme der Heilbronn Marketing verschlüsselt.Suttipun – shutterstock.com Laut einem Bericht des...
View ArticleOracle quietly admits data breach, days after lawsuit accused it of cover-up
Oracle has finally admitted to suffering a significant data breach, quietly notifying select customers about the security incident just days after being hit with a class action lawsuit that accused...
View ArticleGitHub upgrades tooling to help developers stop leaking secrets
Over 39 million API keys, credentials, and other secrets leaked onto GitHub’s platform last year, but an update to its scanning tool could help stop that. The widely used cloud-based version-control...
View ArticleSurge in threat actors scanning Juniper, Cisco, and Palo Alto Networks devices
A surge in internet probes targeting devices from Juniper Networks, Cisco Systems, and Palo Alto Networks should put their admins on alert, say security experts. A threat actor is probing the internet...
View ArticleToo little budget for OT security despite rising threats
Despite OT security increasingly becoming a mainstream concern, only 27% of companies delegate budget control over securing their operations infrastructure to their CISOs or CSOs, according to global...
View Article