-
Darknet job exchange: Hackers are looking for renegade insiders
The Darknet is not just an exchange for...
March 18, 2024 0 Comments -
Solar energy systems – how safe are they?
A study examined the IT security of solar energy systems.…
March 15, 2024 0 Comments -
New wave of phishing: Attackers use Adobe InDesign
There is currently an increase in phishing attacks that...
March 13, 2024 0 Comments -
Cyber attacks: decline in the DACH region
There were fewer cyberattacks in Q4 2023 than...
March 11, 2024 0 Comments
Data: Complete visibility and control of the pipeline
A new technology offers companies a single pipeline to manage and control their petabyte-scale data collection. This allows…
15 years of Qakbot – a review
Qakbot (aka QBot or Pinkslipbot) is a Trojan with a 15-year evolutionary history. From its origins as a banking Trojan followed...
Cyber attack on healthcare platform in the USA
A devastating cyber attack recently occurred on the US payment service Change Healthcare, which is part of the UnitedHealth Group. Many healthcare organizations…
Data: Reliable and accurate thanks to AI engine
Innovative AI-supported data observability functions from a well-known provider ensure high quality of all externally collected data. This contributes to False...
Shadow IT becomes Shadow AI
The path for users to AI is very short; entry is gentle, easy and often free of charge. And that…
Secure access through Zero Trust SD-WAN
A leading cloud security provider has announced a new Zero Trust SASE solution built on Zero Trust SD-WAN. She…