Die 10 häufigsten IT-Sicherheitsfehler

Die 10 häufigsten IT-Sicherheitsfehler

srcset=” 12500w, 300w, 768w, 1024w, 1536w, 2048w, 1240w, 150w, 1046w, 252w, 126w, 720w, 540w, 375w” width=”1024″ height=”683″ sizes=”(max-width: 1024px) 100vw, 1024px”>Von ungepatchten Sicherheitslücken bis hin zu unzureichenden Backups: Lesen Sie, wie sich die häufigsten IT-Sicherheitsfehler vermeiden lassen.   eamesBot – Shutterstock.com Verschlüsselte Dateien und eine Textdatei mit einer Erpresser-Nachricht zeigen klar und deutlich: Ein Unternehmen…

Read More
Making a case for the cybersecurity data fabric | TechTarget

Making a case for the cybersecurity data fabric | TechTarget

Information, data and context are the weapons that cybersecurity teams use to battle adversaries daily. Yet, using cybersecurity data in the modern enterprise has become increasingly difficult. The data is often scattered among dozens of point technologies, fragmented with use-case-specific interfaces, and siloed between IT, security and application teams with little capability to support…

Read More
State-aligned APT groups are increasingly deploying ransomware – and that’s bad news for everyone

State-aligned APT groups are increasingly deploying ransomware – and that’s bad news for everyone

The blurring of lines between cybercrime and state-sponsored attacks underscores the increasingly fluid and multifaceted nature of today’s cyberthreats 07 Jan 2025  •  , 5 min. read There was a time when the boundary between cybercrime and state-aligned threat activity was rather easy to discern. Cybercriminals were fuelled solely by the profit motive. And their…

Read More
⚡ THN Weekly Recap: GitHub Supply Chain Attack, AI Malware, BYOVD Tactics, and More

⚡ THN Weekly Recap: GitHub Supply Chain Attack, AI Malware, BYOVD Tactics, and More

Mar 24, 2025Ravie LakshmananWeekly Recap / Hacking A quiet tweak in a popular open-source tool opened the door to a supply chain breach—what started as a targeted attack quickly spiraled, exposing secrets across countless projects. That wasn’t the only stealth move. A new all-in-one malware is silently stealing passwords, crypto, and control—while hiding in plain…

Read More
Public-private partnerships: A catalyst for industry growth and maturity

Public-private partnerships: A catalyst for industry growth and maturity

As cybercriminals evolve their tactics, relying on tools like AI to simplify and speed their existing efforts, the cybersecurity industry also must evolve at an extraordinary pace. From CISOs to government agencies to software vendors, organizations everywhere are constantly rethinking and reimagining their approaches, with many adopting emerging technologies and developing more proactive strategies for…

Read More
13 steps & best practices to follow

13 steps & best practices to follow

An application programming interface enables software applications to interact with each other by controlling how requests are made and handled. Thanks to the rise of cloud computing and a shift from monolithic applications to microservices, application programming interfaces are a pivotal element in today’s digital world. There are likely millions of public APIs in use…

Read More