Was bei der Cloud-Konfiguration schiefläuft – und wie es besser geht

Einen weiteren blinden Fleck in Sachen Cloud Security sieht Roy während Fusionen und Übernahmen. Er mahnt…

Behind the Mythos hype, Glasswing has just one confirmed CVE

Why is Glasswing still a big deal VulnCheck’s findings reframe Glasswing’s capabilities. The limited number of…

Microsoft’s Windows Recall still allows silent data extraction

“The short-term fix is fairly straightforward. Microsoft could add stronger code integrity and process protections to…

DDoS-Angriffe haben sich verdoppelt

Die Angriffsvolumina stiegen 2025 um den Faktor 5,5 gegenüber 2024. Gcore Radar Angriffsstruktur verändert sich Volumetrische…

AI is breaking traditional security models — Here’s where they fail first

Adopting LLM-based AI-assisted security triage helps accelerate how teams detect, triage and prioritize those vulnerability findings…

6 key trends reshaping the IAM market

“Many enterprises are still in the early stages of deploying passkeys and FIDO2, and biometrics are…

PyPI warns developers after LiteLLM malware found stealing cloud and CI/CD credentials

The disclosure highlighted a common approach that attackers follow these days. Instead of going off immediately…

Trivy supply chain breach compromises over 1,000 SaaS environments, Lapsus$ joins the extortion wave

“Repeated compromises of the same vendor in a short period suggest a persistent weakness,” said Cory…

Chained vulnerabilities in Cisco Catalyst switches could induce denial-of-service

Opswat also discovered two other Catalyst 9300 vulnerabilities: CVE-2026-20112 (cross-site scripting) and CVE-2026-20113 (CRLF injection). These…

New critical Citrix NetScaler hole of similar severity to CitrixBleed2, says expert

As categories, ADCs and VPNs are prime targets for threat actors because they are internet-facing. “Anything…