Those who know me know that I have a healthy obsession with travel. So, I often…
15 AI tools to streamline your social media strategy
It’s no secret that content is king. And with more and more channels to keep up…
How to create an infographic in PowerPoint [free templates]
As a former digital journalist and now a content creator at HubSpot, I’ve designed everything from…
Ransomware-Bande erpresst Brauerei Oettinger
Cyberkriminelle haben die IT-Systeme der Brauerei Oettinger verschlüsselt. Die Produktion ist nicht betroffen. defotoberg – shutterstock.com…
Hackers booby trap NPM with cross-language imposter packages
Hackers are abusing the Node Package Manager (NPM) registry — a database of JavaScript packages —…
Meta wins $168M judgment against spyware seller NSO Group
Enterprise security implications For enterprise security leaders, the case highlights the sophisticated threats organizations face from…
Smashing Security podcast #415: Hacking hijinks at the hospital, and WASPI scams
He’s not a pop star, but Jeffrey Bowie is alleged to have toured staff areas of…
How to find container-based threats in host-based logs
The risks associated with containerized environments Although containers provide an isolated runtime environment for applications, this…
Mobile threat report for Q1 2025
IT threat evolution in Q1 2025. Mobile statisticsIT threat evolution in Q1 2025. Non-mobile statistics Quarterly…
Desktop and IoT threat statistics for Q1 2025
IT threat evolution in Q1 2025. Non-mobile statisticsIT threat evolution in Q1 2025. Mobile statistics The…