Security experts advise CISOs to consider such perception problems when setting security strategies and communicating cybersecurity’s…
Support for Dobrindt’s plans for active cyber defense
Federal Interior Minister Alexander Dobrindt (CSU) wants to present a change to the law on cyber…
Step aside, SOC. It’s time to ROC
What is a ROC? At its core, the Resilience Risk Operations Center (ROC) is a proactive…
Cybersicherheit ist größte Herausforderung für die Finanzbranche
Laut Studie werden die Angriffe zunehmend komplexer und zielen auf Schwachstellen in Systemen und Prozessen. In…
Maverick: a new banking trojan abusing WhatsApp in a massive scale distribution
A malware campaign was recently detected in Brazil, distributing a malicious LNK file using WhatsApp. It…
Hidden links: why your website traffic is declining
When analyzing the content of websites in an attempt to determine what category it belongs to,…
Malicious package with AdaptixC2 framework agent found in npm registry
Incident description The first version of the AdaptixC2 post-exploitation framework, which can be considered an alternative…
Board-ready cyber resilience: How to track and prove readiness
Every CISO out there knows the awkward silence that follows the question: “But how can we…
Jensen Huang says Nvidia's AI chips are now being manufactured in Arizona
NVIDIA CEO Jensen Huang speaks during the Live Keynote Pregame during the Nvidia GTC (GPU Technology…
Apple crosses $4 trillion market cap for the first time
Apple CEO Tim Cook greets customer at the Fifth Avenue Apple Store on new product launch…