Source: www.csoonline.com – Author: KI revolutioniert nicht nur die Geschäftsprozesse, sondern birgt neue Fallstricke für CIOs. Wir zeigen, wie ein auf KI zugeschnittenes GRC-Rahmenwerk helfen kann....
Year: 2025
Schluss mit schlechter Software – Source: www.csoonline.com
Source: www.csoonline.com – Author: Noch immer betreiben Unternehmen enormen Aufwand, um sich gegen Software-Schwachstellen zu schützen – anstatt von Anbietern konsequent sichere Produkte einzufordern. Softwaresicherheit beginnt...
M&S says it will respond to April cyberattack by accelerating digital transformation plans – Source: www.cio.com
Source: www.cio.com – Author: As the profit hit from the incident reaches $400 million, company says it will compress a two-year upgrade project into six months....
BadSuccessor: Unpatched Microsoft Active Directory attack enables domain takeover – Source: www.csoonline.com
Source: www.csoonline.com – Author: Unprivileged users with permission to create objects inside an Active Directory organizational unit can abuse the new Delegated Managed Service Accounts (dMSA)...
Cyberangriff auf Arla Deutschland – Source: www.csoonline.com
Source: www.csoonline.com – Author: Der Molkereikonzern Arla wurde Ziel einer Cyberattacke. Dadurch war die Produktion an einem Standort in Deutschland beeinträchtigt. Das deutsche Arla-Werk in Upahl...
Ransomware-Bande BlackBasta hat neuen Malware-Favoriten – Source: www.csoonline.com
Source: www.csoonline.com – Author: Die modulare Malware Skitnet ist maßgeschneidert für Cybercrime, da sie über spezielle Plugins für Diebstahl, Verschlüsselung und Persistenz verfügt. Die BlackBasta-Bande scheint...
Critical flaw in OpenPGP.js raises alarms for encrypted email services – Source: www.csoonline.com
Source: www.csoonline.com – Author: It could pose a serious risk to services like Proton Mail that use OpenPGP.js for client-side encryption. A newly discovered flaw in...
Trust becomes an attack vector in the new campaign using trojanized KeePass – Source: www.csoonline.com
Source: www.csoonline.com – Author: The attack’s success hinged on exploiting the assumed safety of open-source tools and the ease of impersonating legitimate software online. A known...
GitHub package limit put law firm in security bind – Source: www.csoonline.com
Source: www.csoonline.com – Author: A cautionary tale of how a developer tool limit case could derail cybersecurity protections if not for quick thinking, public outreach, longtime...
CISA Says Russian Hackers Targeting Western Supply-Lines to Ukraine – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine The US government’s cybersecurity agency CISA is sounding the alarm over what it calls an “elevated threat” from Russia’s military-intelligence...
Now Live: Threat Detection & Incident Response (TDIR) Summit – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News SecurityWeek’s 2025 Threat Detection & Incident Response (TDIR) Summit takes place today (May 21st) from 11 AM ET to 4PM...
More AIs Are Taking Polls and Surveys – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier I already knew about the declining response rate for polls and surveys. The percentage of AI bots that respond to...
News alert: DataHub secures $35M Series B to enable AI to safely manage and use data – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido Palo Alto, Calif., May 21, 2025 – DataHub, by Acryl Data, the leading open source metadata platform, today announced it has...
News alert: Attaxion integrates its EASM Platform with ENISA’s EU Vulnerability Database (EUVD) – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: cybernewswire Dover, Del., May 21, 2025, CyberNewswire — Attaxion, the external attack surface management (EASM) vendor with industry-leading asset coverage, announces the...
What to do if you can’t get into your Facebook or Instagram account – Source: www.theguardian.com
Source: www.theguardian.com – Author: Samuel Gibbs Consumer technology editor Your Facebook or Instagram account can be your link to friends, a profile for your work or...
Dero miner zombies biting through Docker APIs to build a cryptojacking horde – Source: securelist.com
Source: securelist.com – Author: Amged Wageh Introduction Imagine a container zombie outbreak where a single infected container scans the internet for an exposed Docker API, and...
Proofpoint to acquire Hornetsecurity in move to expand Microsoft 365 threat protection – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: SECURITY Proofpoint to acquire Hornetsecurity in move to expand Microsoft 365 threat protection Cybersecurity firm Proofpoint Inc. today announced it plans to acquire Hornetsecurity...
Proofpoint to acquire Hornetsecurity for over $1 billion – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: Skip to main content Voting is open for the 2025 CyberScoop 50 awards! Click here! Listen to this article 0:00 Learn more....
Proofpoint CEO On ‘Monumental’ Hornetsecurity Deal, MSP Growth In US – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: With the acquisition deal positioning Proofpoint for major growth with MSPs and SMBs in the U.S. market, ‘this is a big strategic...
Cybersecurity firm Proofpoint to buy European rival for over $1 billion as it eyes IPO – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: Pavlo Gonchar | Lightrocket | Getty Images Cybersecurity firm Proofpoint is acquiring European rival Hornetsecurity for north of $1 billion to strengthen...
RSAC 2025: Agentic AI, Identity And The New Rules Of Cyber Defense – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: Cybersecurity leaders gather at RSAC 2025 to explore AI innovation, identity threats, and the future … More of digital defense in an...
Voice of the Vendor: RSAC 2025, Part 1 – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: Acer America Corp. is a computer manufacturer of business and consumer PCs, notebooks, ultrabooks, projectors, servers, and storage products. Location 333 West...
Threat intelligence platform buyer’s guide: Top vendors, selection advice – Source: www.csoonline.com
Source: www.csoonline.com – Author: Threat intelligence platforms have evolved and became essential security defensive tools. Here is what you need to know before choosing a TIP....
Poor DNS hygiene is leading to domain hijacking – Source: www.csoonline.com
Source: www.csoonline.com – Author: Infoblox says crooks are finding and taking over ‘dangling’ CNAME records for scams. Threat actors continue to find ways of hijacking domains...
CSO30 Australia Awards 2025: Nominations now open – Source: www.csoonline.com
Source: www.csoonline.com – Author: CSO Australia is accepting nominations for the 2025 CSO30 Awards, entries close on 20 June. Nominations are officially open for the 2025...
8 KI-Sicherheitsrisiken, die Unternehmen übersehen – Source: www.csoonline.com
Source: www.csoonline.com – Author: Eine Studie zeigt: Fast zwei Drittel der Unternehmen versäumen es, die Auswirkungen von GenAI-Tools auf die Sicherheit zu prüfen. In ihrem Wettlauf...
You’ve already been targeted: Why patch management is mission-critical – Source: www.csoonline.com
Source: www.csoonline.com – Author: Every day you delay a patch is a day attackers gain the upper hand. Proactive defense starts with closing the doors they...
Skitnet malware: The new ransomware favorite – Source: www.csoonline.com
Source: www.csoonline.com – Author: The modular malware is tailor-made for ransomware as it features dedicated plugins for theft, encryption, and persistence. Ransomware operators are now actively...
Uncensored AI Tool Raises Cybersecurity Alarms – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A new AI chatbot called Venice.ai has gained popularity in underground hacking forums due to its lack of content restrictions. According to...
Debt Collector Data Breach Affects 200,000 Harbin Clinic Patients – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A third-party data breach has compromised personal information belonging to more than 200,000 Harbin Clinic patients. The breach stems from a cyber-attack...




















