Unternehmen können sich ab sofort über das neue BSI-Portal als NIS2-Einrichtung registrieren und IT-Sicherheitsvorfälle…
Data Breach
-
-
Wenn sich ein User mit einem bösartigen Server verbindet, was durch Social Engineering leicht…
-
Data BreachSecurity
Automated data poisoning proposed as a solution for AI theft threat
by adminby admin“Data poisoning has never really worked well,” said Bruce Schneier, chief of security architecture…
-
Angesichts des rasanten technologischen Wandels müssen IT-Verantwortliche ihre kurzfristigen Strategien heute auf mehr Agilität,…
-
Distributed denial-of-service (DDoS) attacks come in many shapes and sizes, as do the myths…
-
Data BreachSecurity
Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act
by adminby adminJan 05, 2026Ravie LakshmananCryptocurrency / Financial Crime Ilya Lichtenstein, who was sentenced to prison…
-
Data BreachSecurity
Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack
by adminby adminDec 31, 2026Ravie LakshmananSoftware Security / Data Breach Trust Wallet on Tuesday revealed that…
-
Data BreachSecurity
Cybercrime Inc.: Wenn Hacker besser organsiert sind als die IT
by adminby adminCybercrime hat sich zur organisierten Industrie mit Arbeitsteilung gewandelt. DC Studio – Shutterstock.com Was…
-
Data BreachSecurity
React2Shell: Anatomy of a max-severity flaw that sent shockwaves through the web
by adminby adminThe research community mapped this vulnerability quickly and thoroughly. Attackers moved even faster. For…
-
Data BreachSecurity
Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors
by adminby adminIn December 2024, the popular Ultralytics AI library was compromised, installing malicious code that…
