Die besten Cyber-Recovery-LΓΆsungen
Start with the newest briefing in Security Alert and then work backward through the desk.
Read latest briefing βπ€ Desk
Cybersecurity, Privacy, Threats and defense
Start with the newest briefing in Security Alert and then work backward through the desk.
Read latest briefing βDesk archive
Recent discoveries expose risks in Windows, VMware, and password management tools
High-profile breaches and vulnerabilities put pressure on vendors and users alike
A security vulnerability has been discovered in Google API keys, allowing attackers to access private data through the Gemini AI assistant.
Multiple high-profile breaches and vulnerabilities expose weaknesses in digital defenses
Despite a significant increase in ransomware attacks, the percentage of victims paying threat actors has dropped to a record low of 28%, according to blockchain intelligence platform Chainalysis.
Microsoft has broadened its Windows restore feature to more enterprise devices, allowing users to recover settings and Microsoft Store apps from a previous device.
Hackers are compromising networks at an alarming rate, with the average breach time dropping to just 29 minutes in 2025, driven by the increasing use of AI-powered attacks.
State accuses Steam operator of violating gambling laws with random virtual prizes
China-linked hackers exploited app to spy on telecoms and governments
The idea that employees are the last line of defense in cybersecurity is a flawed strategy that puts undue burden on untrained staff.
The cybersecurity community is abuzz with excitement as RSA 2026 draws near.
Unternehmen investieren in Sicherheitstechnologien, um Risiken zu minimieren und Umsatz zu steigern
Researchers have discovered a new remote access trojan called Steaelite, which combines data theft and ransomware management capabilities in a single tool, making it easier for attackers to launch sophisticated cyberattacks.
A vulnerability in the Smart Slider 3 WordPress plugin, active on more than 500,000 websites, can be exploited to allow subscriber-level users access to arbitrary files on the server.
In recent years, cybercrime has evolved to become more sophisticated and widespread.
A recent surge in cyber threats has seen the emergence of new malware, phishing campaigns, and the exploitation of human psychology.
Russian hackers target Ukrainian government, while Telnet and Ubiquiti UniFi flaws expose systems to remote code execution
Cybersecurity Under Siege: Quantum Threats, Breaches, and State Actors A perfect storm of vulnerabilities and nation-state attacks Cybersecurity threats are escalating as hackers exploit vulnerabilities, nation-states develop quantum-resistant encryption
Hackers exploit AI tools, adopt new tactics, and target vulnerabilities, as the US government emphasizes offensive operations and deregulation in its cybersecurity strategy.
Samsung reaches settlement with Texas, revising its data collection practices and halting the unauthorized collection of Texans' viewing data without express consent.
A popular Chrome extension, QuickLens, was hijacked to push malware and steal cryptocurrency from approximately 7,000 users, highlighting the risks of third-party browser extensions.
A short-lived malware operation, Arkanix Stealer, was likely developed using AI assistance, offering data-stealing features and anti-analysis capabilities.
Cybersecurity Under Siege Cyber threats are on the rise, with major companies and organizations falling victim to data breaches and hacking attempts.