News

Sicherheitsforscher haben herausgefunden, wie sich die Sicherheitsfilter von Musks neuem Chatbot aushebeln lassen.
Seemingly harmless SVGs are packed with malicious JavaScript for a phishing redirect to actor-controlled URLs.
Gathering threat intelligence, finding the perpetrators of cyber attacks and bringing down whole ransomware gangs are some of ...
The CISO’s role has always been to protect the organization from threats it does not yet understand. AI poisoning requires ...
Increasing responsibilities and greater need to align with business objectives have security leaders facing greater risks — ...
In practice, incident response teams repeatedly encounter the same weaknesses. What are they and how can they be resolved?
Ein Bug in Google Gemini erlaubt es Angreifern, E-Mail-Zusammenfassungen zu kapern und Phishing-Attacken zu starten.
Just days after launch, Elon Musk’s Grok-4 is compromised by researchers using a stealthy blend of Echo Chamber and Crescendo ...
Eine international agierende Hackergruppe soll in Deutschland mindestens 170 Cyberangriffe verübt haben. “Ziel waren ...
Wer seine IT-Systeme nicht ausreichend schützt, geht ins Risiko. Für rund 29.000 wichtige Unternehmen und Einrichtungen soll ...
Valuable tools for experienced attackers and researchers, LLMs are not yet capable of creating exploits at a prompt, ...
Eine schwerwiegende Sicherheitslücke in der Plattform von ServiceNow erlaubt es Angreifern, sensible Daten zu stehlen.