Support for Dobrindt’s plans for active cyber defense

Federal Interior Minister Alexander Dobrindt (CSU) wants to present a change to the law on cyber…

Step aside, SOC. It’s time to ROC

What is a ROC? At its core, the Resilience Risk Operations Center (ROC) is a proactive…

Cybersicherheit ist größte Herausforderung für die Finanzbranche

Laut Studie werden die Angriffe zunehmend komplexer und zielen auf Schwachstellen in Systemen und Prozessen. In…

Volvo’s recent security breach: 5 tips to speed incident response while preserving forensic integrity

Identify and catalog your evidence sources in advance (endpoints, memory, logs, cloud assets) Stage scripts or…

Atlas browser exploit lets attackers hijack ChatGPT memory

How to detect a hit Detecting a memory-based compromise in ChatGPT Atlas is not like hunting…

Copilot diagrams could leak corporate emails via indirect prompt injection

Logue was able to demonstrate (in a proof of concept), creating financial sheets with crafted instructions…

How evolving regulations are redefining CISO responsibility

CISOs face increasing personal and criminal liability for improper or incomplete risk management and disclosure during…

No reprieve for enterprise Windows 10 users

Compliance gaps and enterprise risks Extended Security Updates deliver only critical and important security patches. Even…

SAP GUI flaws expose sensitive data via weak or no encryption

Pathlok, too, warned that despite a medium CVSS rating of 6 out of 10, the flaws…

Ransomware: So viel Lösegeld zahlen Unternehmen

600.000 Dollar (525.000 Euro) in Deutschland 643.000Dollar (563.000 Euro) in Frankreich 4,12 Millionen Dollar (3,61 Millionen…