AI gives superpowers to BEC attackers – CSO Online
As much as it has been used to defend and make some taxing jobs easier, AI is also being extensively employed by attackers, helping them collect specific data that is…
As much as it has been used to defend and make some taxing jobs easier, AI is also being extensively employed by attackers, helping them collect specific data that is…
Threat-Intelligence-Plattformen erleichtern es, Bedrohungen zu durchdringen und wirksame Abwehrmaßnahmen zu ergreifen. specnaz | shutterstock.com Der erste Schritt zu einem soliden Enterprise-Security-Programm besteht darin, eine geeignete Threat-Intelligence-Plattform (TIP) auszuwählen. Fehlt eine…
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?quality=50&strip=all 1422w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/05/Timo-W-Foto-Interview.png?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”(max-width: 1024px) 100vw, 1024px”>Timo Wandhöfer verantwortet als Group CISO beim…
Download the June 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World. aria-label=”Embed of Enterprise Spotlight: New Thinking about Cloud Computing.”>Enterprise Spotlight:…
Download the June 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World. aria-label=”Embed of Enterprise Spotlight: New Thinking about Cloud Computing.”>Enterprise Spotlight:…
International gesucht: Hacker-Boss soll sich in Russland verstecken – Hinweise erbeten. DC Studio – shutterstock.com Der Anführer der berüchtigten russischen Cybercrime-Gruppe Trickbot, die seit mindestens 2016 weltweit massive Schäden anrichtet,…
Im Darknet ist ein Hinweis auf einen Datendiebstahl bei der Volkswagen Gruppe aufgetaucht. r.classen – shutterstock.com Die Volkswagen Gruppe mit Sitz in Wolfsburg zählt weltweit zu den größten Autokonzernen und…
The US law enforcement, in coordination with global efforts, has disrupted counter-antivirus (CAV) operations by shuttering four leading domains offering these services. According to a Department of Justice (DOJ) press…
A career in cybersecurity is attractive for a number of reasons. The perpetual shortage of security practitioners means you can always get a job, and the tight talent market ensures…
Zero-Knowledge-Protokolle wie zk-SNARK nutzen die kleinstmögliche Informationsmenge zur Authentifizierung. Nomad Soul | shutterstock.com Unter den Zero-Knowledge-Protokollen nimmt zk-SNARK (Zero-knowledge succinct non-interactive argument or knowledge) eine Sonderrolle ein – es ist…
A newly uncovered botnet is targeting Asus routers — specifically models RT-AC3100 and RT-AC3200 — to hijack and repurpose a built-in, AI-powered security feature. The campaign, detected by GreyNoise in…
srcset=”https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?quality=50&strip=all 1742w, https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?resize=300%2C168&quality=50&strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?resize=768%2C432&quality=50&strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?resize=1024%2C576&quality=50&strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?resize=1536%2C864&quality=50&strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?resize=1240%2C697&quality=50&strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?resize=150%2C84&quality=50&strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?resize=854%2C480&quality=50&strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?resize=640%2C360&quality=50&strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/05/vju-ruegen-hotel-ausblick.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”(max-width: 1024px) 100vw, 1024px”>In den Hotels der Arcona…
Security researchers are warning about a novel Linux botnet, dubbed PumaBot, targeting Internet of Things (IOT) surveillance devices. According to a DarkTrace observation, the botnet >bypasses the usual playbook of…
Russische Hacker ändern ihre Taktik von Passwort-Spraying zu Phishing, aber ihre Ziele innerhalb der NATO bleiben gleich. PX Media – Shutterstock.com Seit über einem Jahr hat es eine neue Cyberspionage-Gruppe,…
Selbst MFA ist vor raffinierten, KI-gesteuerten Phishing-Angriffen nicht sicher. Biometrische Verfahren gelten als vielversprechende Alternative. CC7 – shutterstock.com Die rasante Entwicklung von KI-Agenten eröffnet Cyberkriminellen neue Angriffsmöglichkeiten, die insbesondere für…