NIS-2: Tausende überschreiten BSI-Frist und riskieren Strafen

New Cybersecurity Law Comes into Effect in Germany: A Response to Growing Threats On December 6, 2025, Germany's new law for implementing the EU's NIS-2...

Threat Actor Exploits Vulnerabilities and Utilizes Elastic Cloud SIEM for Managing Stolen Data

Cybersecurity Researchers Uncover Extensive Data Theft Campaign Cybersecurity researchers have recently revealed a sophisticated campaign that exploits multiple software vulnerabilities, allowing threat actors to steal sensitive system data and store it within a cloud-based security platform. The alarming findings, disclosed by the cybersecurity firm Huntress,...

Cyber Espionage Campaign Leveraging Web Server Exploits and Credential Theft Tools

Security analysts have uncovered an ongoing cyber campaign that has been targeting organizations...

Celebrating International Women’s Day 2026

Celebrating International Women’s Day: Insights from Trailblazing Women in Cybersecurity Every year, International Women’s Day...

NIS-2: Tausende überschreiten BSI-Frist und riskieren Strafen

New Cybersecurity Law Comes into Effect in Germany: A Response to Growing Threats On December...

Threat Actor Exploits Vulnerabilities and Utilizes Elastic Cloud SIEM for Managing Stolen Data

Cybersecurity Researchers Uncover Extensive Data Theft Campaign Cybersecurity researchers have recently revealed a sophisticated campaign...

OpenAI Reports Codex Security Discovered 11,000 High-Impact Bugs in One Month

Flaws Uncovered in Proprietary and Open-Source Projects: A Deep Dive into OpenAI's Codex Security...

Banks Required to Compensate Phishing Victims

EU Advocate General Calls for Immediate Refunds for Victims of Unauthorized Transactions In a significant...

NIS-2: Tausende überschreiten BSI-Frist und riskieren Strafen

New Cybersecurity Law Comes into Effect in Germany: A Response to Growing Threats On December 6, 2025, Germany's new law for implementing the EU's NIS-2...

Cyber Espionage Campaign Leveraging Web Server Exploits and Credential Theft Tools

Security analysts have uncovered an ongoing cyber campaign that has been targeting organizations...

Celebrating International Women’s Day 2026

Celebrating International Women’s Day: Insights from Trailblazing Women in Cybersecurity Every year, International Women’s Day...

Cyber Espionage Campaign Leveraging Web Server Exploits and Credential Theft Tools

Security analysts have uncovered an ongoing cyber campaign that has been targeting organizations...
spot_img

Cyber Balkans

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Methods for detecting PaperCut vulnerabilities are circumventable, and Iranian cyber attackers are now involved. A fresh breed of ransomware uses VPNs to penetrate its...

PaperCut vulnerability detection methods have recently been discovered to be easily bypassed, allowing hackers...

Advancements in AI Cybersecurity: Utilizing ChatGPT to Remain Ahead of Cyber Criminals

The field of cybersecurity has rapidly evolved in recent times as the world becomes...

NIS-2: Tausende überschreiten BSI-Frist und riskieren Strafen

New Cybersecurity Law Comes into Effect in Germany: A Response to Growing Threats On December...

Cyber Espionage Campaign Leveraging Web Server Exploits and Credential Theft Tools

Security analysts have uncovered an ongoing cyber campaign that has been targeting organizations...

Celebrating International Women’s Day 2026

Celebrating International Women’s Day: Insights from Trailblazing Women in Cybersecurity Every year, International Women’s Day...

Delilah Schwartz from Cybersixgill Talks About the Evolving Dark Web and New Threats from ChatGPT and Other AI Technologies.

Delilah Schwartz, a cyber threat analyst from Cybersixgill, has recently given an insightful interview...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

Risk and Repeat: Are data extortion attacks equivalent to ransomware?

The threat landscape of ransomware has undergone significant changes, leading to a transformation in...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Salt Security collaborates with leading API testing experts in IT security

Salt Security has launched its Salt Technical Ecosystem Partner (STEP) program, aimed at helping...

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

Malware

The Multi-Billion Dollar AI Bet – Who Owns the Outcome?

Growing AI Investments Push Enterprises to Demand Accountability From Tech Vendors In a landscape where technology expenditure has reached staggering amounts, the questions surrounding accountability and outcomes are gaining prominence. The rapid increase in investments in artificial intelligence (AI) has not translated into tangible benefits...

Nokoyawa Ransomware Exploits Windows Zero Day Vulnerabilities

A report released by Kaspersky Labs recently shed light on a threat actor that...

PEGA Committee Advocates for Restrictions on Commercial Spyware

The European Parliament committee investigating the abuse of commercial spyware tools such as Pegasus...

Cyberattacks Are Becoming More Sophisticated – Is Your Mainframe Secure? Webinar

ISMG Welcomes New Registrants ISMG, a well-recognized entity in the realm of information security and...
spot_img

RISK MANAGEMENTS

Threat Actor Exploits Vulnerabilities and Utilizes Elastic Cloud SIEM for Managing Stolen Data

Cybersecurity Researchers Uncover Extensive Data Theft Campaign Cybersecurity researchers have recently revealed a sophisticated campaign that exploits multiple software vulnerabilities, allowing threat actors to steal...

Explaining the Difference between Symmetric and Asymmetric Encryption

Data is one of the most valuable assets for any organization today. The vast...

OpenAI Reports Codex Security Discovered 11,000 High-Impact Bugs in One Month

Flaws Uncovered in Proprietary and Open-Source Projects: A Deep Dive into OpenAI's Codex Security...

TriZetto Provider Solutions Breach Affects 3.4 Million Patients

In a significant breach of personal and health insurance information, millions of patients have been adversely affected following a cybersecurity incident involving TriZetto Provider Solutions (TPS), an IT firm specializing in services for the healthcare sector. The breach, the details of which came to...

Trump’s Cyber Strategy Highlights Offensive Operations, Deregulation, and AI

Title: U.S. Cybersecurity Strategy Receives Praise from Key Industry Leaders Amidst Calls for Implementation In a recent statement, Nikesh Arora, the CEO of Palo Alto...

Cyber Architecture

NIS-2: Tausende überschreiten BSI-Frist und riskieren Strafen

New Cybersecurity Law Comes into Effect in Germany: A Response to Growing Threats On December...

Cyber Espionage Campaign Leveraging Web Server Exploits and Credential Theft Tools

Security analysts have uncovered an ongoing cyber campaign that has been targeting organizations...

Four Strategies to Equip Your SOC for Agentic AI Preparing Your SOC for Agentic AI: Four Key Approaches Four Essential Steps to...

In the rapidly evolving landscape of cybersecurity, the integration of artificial intelligence (AI) has...

Europa im Fokus von Cyber-Identitätsdieben

The Growing Threat of Cyberattacks in Germany: A New Report Highlights Alarming Trends In an...

Proofpoint Introduces AI-Powered Discovery and Archive Suite for Small to Medium Businesses

New Nuclei Suite Delivers Comprehensive Digital Communications Governance Solutions for SMBs SUNNYVALE, Calif. – March 3, 2026 – In a significant development for small-to-medium-sized businesses (SMBs), Proofpoint, Inc., a leader in cybersecurity and compliance, has unveiled the global availability of its new Nuclei Discovery &...

All articles

NIS-2: Tausende überschreiten BSI-Frist und riskieren Strafen

New Cybersecurity Law Comes into Effect in Germany: A Response to Growing Threats On December...

Threat Actor Exploits Vulnerabilities and Utilizes Elastic Cloud SIEM for Managing Stolen Data

Cybersecurity Researchers Uncover Extensive Data Theft Campaign Cybersecurity researchers have recently revealed a sophisticated campaign...

Cyber Espionage Campaign Leveraging Web Server Exploits and Credential Theft Tools

Security analysts have uncovered an ongoing cyber campaign that has been targeting organizations...

Celebrating International Women’s Day 2026

Celebrating International Women’s Day: Insights from Trailblazing Women in Cybersecurity Every year, International Women’s Day...

OpenAI Reports Codex Security Discovered 11,000 High-Impact Bugs in One Month

Flaws Uncovered in Proprietary and Open-Source Projects: A Deep Dive into OpenAI's Codex Security...

Banks Required to Compensate Phishing Victims

EU Advocate General Calls for Immediate Refunds for Victims of Unauthorized Transactions In a significant...

Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

 Notepad++ has released a security fix to plug gaps that were exploited by...

TriZetto Provider Solutions Breach Affects 3.4 Million Patients

In a significant breach of personal and health insurance information, millions of patients have...

Managing Application Access on Frontline Devices in a Constantly Connected Environment

Australia’s recent decision to restrict social media access for children under 16 represents a...

ClipXDaemon Malware Targets Crypto Users in Linux X11 Sessions

Emergence of ClipXDaemon: A New Threat to Linux Cryptocurrency Users The cybersecurity landscape is facing...

PQC Roadmap Uncertain as Vendors Compete for Early Advantage

Quantum Threats: A Call to Action for Cybersecurity In the evolving landscape of cybersecurity, recent...

Four Strategies to Equip Your SOC for Agentic AI Preparing Your SOC for Agentic AI: Four Key Approaches Four Essential Steps to...

In the rapidly evolving landscape of cybersecurity, the integration of artificial intelligence (AI) has...