
Cybersecurity

Die besten Hacker-Filme
Vorsicht, dieses Film-Listicle kann zu Prokrastination verführen! Nomad Soul | shutterstock.com Security-Profis und -Entscheider mit Hang zur Filmkunst müssen auch nach Feierabend nicht auf ihr Leib-und-Magen-Thema verzichten – einer Fülle cineastischer Ergüsse sei Dank. Das Film-Pflichtprogramm für Security-Profis Wir haben die unserer Meinung nach besten (Achtung: Nerd-Brille erforderlich) Hacker-Filme nachfolgend für Sie zusammengestellt – in…

What are the top 10 spyware threats? | Definition from TechTarget
The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes. What is spyware? Spyware refers to malicious software purposely designed to access a computer and record its activity. Spyware can track and record a user’s…

ClickFix Scam: How to Protect Your Business Against This Evolving Threat
Cybercriminals aren’t always loud and obvious. Sometimes, they play it quiet and smart. One of the tricks of making the rounds is called ClickFix. It doesn’t break down doors. Instead, it politely waits for you to open them. What makes ClickFix concerning for businesses is how perfectly it blends into everyday digital experiences. The malware…

Rethinking AppSec: How DevOps, containers, and serverless are changing the rules – Help Net Security
Application security is changing fast. In this Help Net Security interview, Loris Gutic, Global CISO at Bright, talks about what it takes to keep up. Gutic explains how DevOps, containers, and serverless tools are shaping security, and shares views on the biggest risks, important controls, and why AI must be used carefully. How has your…

How safe and secure is your iPhone really?
Your iPhone isn’t necessarily as invulnerable to security threats as you may think. Here are the key dangers to watch out for and how to harden your device against bad actors. 28 Apr 2025 • , 6 min. read Chances are high that many people think, “it’s an iPhone, so I’m safe”. Apple’s control over…

New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims
Cybersecurity researchers have lifted the lid on two threat actors that orchestrate investment scams through spoofed celebrity endorsements and conceal their activity through traffic distribution systems (TDSes). The activity clusters have been codenamed Reckless Rabbit and Ruthless Rabbit by DNS threat intelligence firm Infoblox. The attacks have been observed to lure victims with bogus platforms,…

6 Mittel gegen Security-Tool-Wildwuchs
Viel hilft nicht immer viel. Foto: Roman Samborskyi | shutterstock.com Auf der Suche nach Möglichkeiten, sich vor ständig wachsenden Cyberbedrohungen zu schützen, erliegen nicht wenige Unternehmen einem regelrechten Security-Tool- und -Service-Kaufrausch. Kommen noch Abteilungssilos und regelmäßige Übernahmen hinzu, steigt die Chance, dass Sicherheitsentscheider mit Tool-Wildwuchs konfrontiert werden. Diesen zu reduzieren, liegt nicht nur aus Kostengründen…

15 of the Biggest Ransomware Attacks in History | Informa TechTarget
Ransomware has become a favorite attack strategy for bad actors, with reports labeling it the most effective way for cybercriminals to monetize illegal access into networks. News of ransomware attacks appears daily. More troubling still are predictions that ransomware gangs are becoming more adept at using AI, and well-funded ones could soon use agentic…

Week in review: Critical SAP NetWeaver flaw exploited, RSAC 2025 Conference – Help Net Security
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: RSAC 2025 ConferenceRSAC 2025 Conference took place at the Moscone Center in San Francisco. Check out our microsite for related news, photos, product releases, and more. Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)CVE-2025-31324, a critical vulnerability…

The Sophos Annual Threat Report: Cybercrime on Main Street 2025
Small businesses are a prime target for cybercrime, as we highlighted in our last annual report. Many of the criminal threats we covered in that report remained a major menace in 2024, including ransomware–which remains a primary existential cyber threat to small and midsized organizations. Ransomware cases accounted for 70 percent of Sophos Incident Response…