Security experts at Resecurity discovered a vulnerability in the infrastructure of the BlackLock ransomware group. They used this to infiltrate the group and obtain configuration files, credentials, ...
Sophos has introduced a new, artificial intelligence-based advisory tool. The "Sophos AI Assistant" guides security professionals of all skill levels through every phase of a threat investigation, ...
Approximately 270.000 data records of Samsung customers have surfaced on the dark web. They are said to contain names, addresses, email addresses, and phone numbers, as well as information on device ...
In most German companies, there are significantly more machine identities than human ones, and this gap will widen further in the coming months. However, companies struggle to protect machine ...
Cyberattackers: Many user accounts of unemployed people have been hacked, and new account details have been entered so that further payments can be redirected to the attackers' accounts. The problem: ...
Sophos has introduced a new artificial intelligence-based advisory tool. The "Sophos AI Assistant" guides security professionals of all skill levels through every phase of a threat investigation, ...
Real-time operating systems (RTOS) operate in billions of devices and represent potential targets for hackers because their cyber resilience has been difficult to verify until now. A new platform now ...
After a months-long investigation dating back to mid-2024, Mandiant publishes its findings on a covert espionage campaign by the China-linked actor (UNC3886), which deployed custom malware on ...
Cyberattackers: Many unemployed user accounts were hacked, and new account details were entered so that further payments could be redirected to the attackers' accounts. The problem: MFA is still not ...
A successful cyberattack is usually only a matter of time. This basic assumption is the crucial first step, even for smaller companies, to prepare for the consequences of a cybersecurity incident.
The Zero Day Initiative (ZDI) has identified ZDI-CAN-25373, a Windows .lnk file vulnerability that has been abused by APT groups with zero-day exploits since 2017, allowing the execution of hidden ...
Cyber resilience is a prerequisite for maintaining the availability of business processes in an increasingly vulnerable digital economy. Platform solutions for proactive defense and automated, clean ...