-
Five local vulnerabilities discovered in needrestart
A provider of cloud-based IT, security and compliance solutions,…
20 December 2024 0 Comments -
RAG: Innovative AI technologies bring dangers
Since the introduction of ChatGPT 2022, more and more people want…
18 December 2024 0 Comments -
2025: Who wants to be responsible for IT security?
Like every year, the IT security specialists at WatchGuard…
16 December 2024 0 Comments -
Active Directory backup and restore
Ransomware threats or active attacks are a major threat to companies…
13 December 2024 0 Comments
Report: Trusted Windows applications abused
In its new Active Adversary Report 2024, Sophos proves the wolf in sheep's clothing: Cyber criminals are increasingly relying on trustworthy Windows applications…
XDR: Protecting data in Atlassian cloud applications
With a new XDR extension, Bitdefender can now also protect data in Atlassian cloud applications. This makes monitoring, detecting and responding…
Outlook 2025: Solutions for changing attack surfaces through AI, IoT & Co
The attack surface of companies will inevitably continue to grow in 2025. The data-driven acceleration, including increasing integration…
Cloud Rewind for rebuilding after a cyberattack
A new solution for cyber recovery and rebuilding cloud-centric IT infrastructures. Commvault Cloud Rewind with new features for finding...
Medusa ransomware group runs open victim blog on the web
In addition to direct communication with the victim, cyber criminals also maintain their external image. Reputation is an important success factor for...
Local Backups: Return to Safe Harbor
Why companies are rediscovering local backup strategies: In recent years, companies have increasingly become dependent on cloud solutions…