Category: CISOOnline
Security company Radware detected 149 DDoS attacks that appeared to be connected to Iran between February 28 and March 2,…
Because authentication is bound to the origin (domain) and the cryptographic challenges cannot be replayed through a reverse proxy, these…
Nicht greifende Recovery-Prozesse sind für Unternehmen ein Albtraumszenario, das dank ausgefeilter Angriffe immer öfter zur Realität wird. Arjuna Kodisinghe |…
A vulnerability in Redis in-memory store posed a critical risk for servers hosting the database. The vulnerability, identified as CVE-2025-49844…
In tabletop exercises the company conducted in 2025, 88% of participants had trouble detecting threats, 94% had difficulty with containment,…
«Plattformen dieser Art sind der Motor für Cyberkriminalität», teilte die Amsterdamer Polizei mit. Die Cybercrime-Experten warnten auch, dass gestohlene Daten…
The same framework resurfaced in summer 2025, this time repurposed by UNC6353, a suspected Russian espionage group, which embedded it…
Other vulnerabilities Of the remaining flaws, a further six are rated ‘high’, with CVSS scores of between 7.2 and 8.6….
The LeakBase cyberforum, considered one of the world’s largest online marketplaces for cybercriminals to buy and sell stolen data and…
Deutsche Unternehmen müssen sich warm anziehen: Sowohl staatliche als auch „private“ Akteure haben es auf sie abgesehen. Shutterstock Wie die…
Das sieht auch Toby Basalla, Gründer und Principal Data Consultant bei Synthelize, so. “Wenn Chaos herrscht, wer weiß dann noch,…
Microsoft was the most targeted vendor, with 25 zero-days exploited across its products, followed by Google with 11, Apple with…











