News
Freshly stolen account data is increasingly being used by cybercriminals for attacks. According to Kaspersky analysis, legitimate accounts were the initial attack vector in 31 percent of security ...
AIs generate everything for the user—including a wealth of fraudulent content, such as deepfakes, AI voices, or fake profiles. Users can be perfectly deceived by these methods—except for good systems.
Sophos has introduced a new, artificial intelligence-based advisory tool. The "Sophos AI Assistant" guides security professionals of all skill levels through every phase of a threat investigation, ...
Approximately 270.000 data records of Samsung customers have surfaced on the dark web. They are said to contain names, addresses, email addresses, and phone numbers, as well as information on device ...
Security experts at Resecurity discovered a vulnerability in the infrastructure of the BlackLock ransomware group. They used this to infiltrate the group and obtain configuration files, credentials, ...
In most German companies, there are significantly more machine identities than human ones, and this gap will widen further in the coming months. However, companies struggle to protect machine ...
Sophos has introduced a new artificial intelligence-based advisory tool. The "Sophos AI Assistant" guides security professionals of all skill levels through every phase of a threat investigation, ...
Real-time operating systems (RTOS) operate in billions of devices and represent potential targets for hackers because their cyber resilience has been difficult to verify until now. A new platform now ...
Cyberattackers: Many user accounts of unemployed people have been hacked, and new account details have been entered so that further payments can be redirected to the attackers' accounts. The problem: ...
Cyberattackers: Many unemployed user accounts were hacked, and new account details were entered so that further payments could be redirected to the attackers' accounts. The problem: MFA is still not ...
After a months-long investigation dating back to mid-2024, Mandiant publishes its findings on a covert espionage campaign by the China-linked actor (UNC3886), which deployed custom malware on ...
Cyber resilience is a prerequisite for maintaining the availability of business processes in an increasingly vulnerable digital economy. Platform solutions for proactive defense and automated, clean ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results