
Cybersecurity

When Getting Phished Puts You in Mortal Danger – Krebs on Security
Many successful phishing attacks result in a financial loss or malware infection. But falling for some phishing scams, like those currently targeting Russians searching online for organizations that are fighting the Kremlin war machine, can cost you your freedom or your life. The real website of the Ukrainian paramilitary group “Freedom of Russia” legion. The…

Die 10 häufigsten IT-Sicherheitsfehler
srcset=” 12500w, 300w, 768w, 1024w, 1536w, 2048w, 1240w, 150w, 1046w, 252w, 126w, 720w, 540w, 375w” width=”1024″ height=”683″ sizes=”(max-width: 1024px) 100vw, 1024px”>Von ungepatchten Sicherheitslücken bis hin zu unzureichenden Backups: Lesen Sie, wie sich die häufigsten IT-Sicherheitsfehler vermeiden lassen. eamesBot – Shutterstock.com Verschlüsselte Dateien und eine Textdatei mit einer Erpresser-Nachricht zeigen klar und deutlich: Ein Unternehmen…

Making a case for the cybersecurity data fabric | TechTarget
Information, data and context are the weapons that cybersecurity teams use to battle adversaries daily. Yet, using cybersecurity data in the modern enterprise has become increasingly difficult. The data is often scattered among dozens of point technologies, fragmented with use-case-specific interfaces, and siloed between IT, security and application teams with little capability to support…

CloudSEK Disputes Oracle Over Data Breach Denial with New Evidence
Oracle is caught up in a cybersecurity mess right now, with claims about a massive data breach affecting its cloud infrastructure. Last week, Hackread.com published an article based on the findings of cybersecurity firm CloudSEK revealing that a threat actor had stolen 6 million records from Oracle Cloud. The hacker, identified as “rose87168“, claimed to…

State-aligned APT groups are increasingly deploying ransomware – and that’s bad news for everyone
The blurring of lines between cybercrime and state-sponsored attacks underscores the increasingly fluid and multifaceted nature of today’s cyberthreats 07 Jan 2025 • , 5 min. read There was a time when the boundary between cybercrime and state-aligned threat activity was rather easy to discern. Cybercriminals were fuelled solely by the profit motive. And their…

⚡ THN Weekly Recap: GitHub Supply Chain Attack, AI Malware, BYOVD Tactics, and More
Mar 24, 2025Ravie LakshmananWeekly Recap / Hacking A quiet tweak in a popular open-source tool opened the door to a supply chain breach—what started as a targeted attack quickly spiraled, exposing secrets across countless projects. That wasn’t the only stealth move. A new all-in-one malware is silently stealing passwords, crypto, and control—while hiding in plain…

Arrests in Tap-to-Pay Scheme Powered by Phishing – Krebs on Security
Authorities in at least two U.S. states last week independently announced arrests of Chinese nationals accused of perpetrating a novel form of tap-to-pay fraud using mobile devices. Details released by authorities so far indicate the mobile wallets being used by the scammers were created through online phishing scams, and that the accused were relying on…

Public-private partnerships: A catalyst for industry growth and maturity
As cybercriminals evolve their tactics, relying on tools like AI to simplify and speed their existing efforts, the cybersecurity industry also must evolve at an extraordinary pace. From CISOs to government agencies to software vendors, organizations everywhere are constantly rethinking and reimagining their approaches, with many adopting emerging technologies and developing more proactive strategies for…

13 steps & best practices to follow
An application programming interface enables software applications to interact with each other by controlling how requests are made and handled. Thanks to the rise of cloud computing and a shift from monolithic applications to microservices, application programming interfaces are a pivotal element in today’s digital world. There are likely millions of public APIs in use…

Where Is Computer Vision Essential Today? Insights from Alltegrio’s CEO
Today, we are discussing Computer Vision applications, one of the most impactful AI-powered technologies that is reshaping our world, with Oleg Goncharenko, the CEO of Alltegrio. Oleg has been an entrepreneur for over 25 years and built a successful 8-figure software service company, as well as a few more innovative tech projects. Alltegrio is Oleg’s…