In 2025, IT security teams will face major challenges: attacks will become more complex and digital attack surfaces will become larger. Trends such as AI-supported defense, securing hybrid working ...
A leading cybersecurity company has analyzed last year's phishing attacks and identified eight trends for 2025. Attackers are increasingly using advanced phishing attack methods to bypass security ...
The 365 Total Backup solution enables end users to restore their mailbox and OneDrive data independently without IT training. Backup and restore is now also available for Microsoft OneNote. This ...
SAP has published its January list of vulnerabilities, including two critical ones with a CVSS score of 9.9 out of 10, as well as three highly dangerous vulnerabilities ranging from 7.8 to 8.8 out of ...
The German economy underestimates the danger of cyber attacks. Not even half of industrial companies conduct regular cybersecurity training for their employees, according to the results of the "OT+IoT ...
Criminals are using Google Calendar to attack mailboxes. They use notifications to smuggle phishing emails past the security measures of many mailboxes. The hackers want to steal company data in order ...
In 2025, IT security teams will face major challenges: attacks will become more complex and digital attack surfaces will become larger. Trends such as AI-supported defense, securing hybrid working ...
Moxa, a provider of industrial switches, reports a critical vulnerability with a CVSS base score of 9.2 out of 10 in its security advisory. Hackers could gain access using brute force attacks. The ...
Viele IT- und Sicherheitsverantwortliche machen sich Sorgen, ob ihr Unternehmen nach einem Cyberangriff noch geschäftsfähig ...
Ein Report hat Cyberattacken in 2024 analysiert und dabei festgestellt: Die meisten Angreifer brechen nicht ein, sondern ...
Cyberkriminelle werden immer agiler und arbeiten weltweit zusammen. Das belegt der neue Forschungsbericht „Bridging Divides, ...
Cyberkriminelle missbrauchen Microsoft Teams als Einfallstor für ihre Angriffe. Sie versuchen dann Daten abzuziehen oder ...