News
AI-powered attack kits go open source, and CyberStrikeAI may be just the beginning
2+ hour, 4+ min ago (526+ words) AI is making it ever easier for bad actors to launch attacks, and a newly-identified open source platform, CyberStrikeAI, seems to be lowering the bar even further. The platform packages end-to-end attack automation into a single AI-native orchestration engine, and…...
Studie: Hacker legen Betrieb bei vielen Unternehmen lahm
22+ hour, 12+ min ago (257+ words) K'rzlich legte eine Cyberattacke Auskunftssysteme der Deutschen Bahn lahm. Eine neue Studie zeigt: Das ist bei weitem kein Einzelfall. Hacker haben im vergangenen Jahr bei vielen Unternehmen in Deutschland Sch'den angerichtet. Das zeigt eine repr'sentative Befragung des Zentrums f'r Europ'ische…...
7 factors impacting the cyber skills gap
1+ day, 21+ hour ago (854+ words) Individuals with strong cybersecurity skills are in high demand. That's no secret. What's most important is the fact that the shortage is preventing many enterprises from building sustainable cybersecurity talent pipelines. According to World Economic Forum statistics, only 14% of organizations…...
Innovation without exposure: A CISO’s secure-by-design framework for business outcomes
1+ day, 22+ hour ago (825+ words) The brief for security leaders has changed. It used to be enough to reduce risk and keep the lights on. Now you are expected to enable AI adoption, connect more "things" to the network, modernize cloud at pace and still…...
Hacker erpressen weniger Lösegeld
1+ day, 23+ hour ago (182+ words) immer mehr betroffene Unternehmen und Organisationen folgen dem Rat, kein L'segeld zu zahlen Auch wenn die Summe hoch ist, im Vergleich zum Vorjahr ist sie damit um 28 Prozent gesunken. Zudem ist zu ber'cksichtigen, dass die Zahl der Angriffe im Jahr…...
A scorecard for cyber and risk culture
4+ day, 10+ hour ago (1461+ words) Have you once watched a leadership team clap for their "security culture month" like they'd landed a rover? Posters everywhere. Quizzes. A prize draw. Someone baked cupcakes with padlocks iced on top. Cute. Two weeks later, a product manager asked…...
OAuth phishers make ‘check where the link points’ advice ineffective
4+ day, 11+ hour ago (574+ words) Microsoft has warned that phishers are exploiting a built-in behavior of the OAuth authentication protocol to redirect victims to malware, using links that point to legitimate identity provider domains such as Microsoft Entra ID and Google Workspace. The links look…...
Security hole could let hackers take over Juniper Networks PTX core routers
4+ day, 11+ hour ago (354+ words) Network admins with Juniper PTX series routers in their environments are being warned to patch immediately, because a newly-discovered critical vulnerability could lead to an unauthenticated threat actor running code with root privileges. This issue affects PTX routers running versions…...
Vulnerability monitoring service secures public-sector websites faster
4+ day, 18+ hour ago (556+ words) An automated scanning system has cut the time it takes to fix cybersecurity vulnerabilities across public sector IT systems, reducing median remediation time for general cyber vulnerabilities from 53 days to 32, and slashing DNS-specific average fix times from 50 days to eight....
US authorities punish sellers of malware and spyware
4+ day, 20+ hour ago (227+ words) The US authorities have made it clear that they will have no truck with any individuals trying to by-pass regulations on trading cyberweapons with hostile powers. Selling sensitive cyber-exploit components to a Russian company landed Australian citizen Peter Williams with…...