In 2025, IT security teams will face major challenges: attacks will become more complex and digital attack surfaces will become larger. Trends such as AI-supported defense, securing hybrid working ...
The 365 Total Backup solution enables end users to restore their mailbox and OneDrive data independently without IT training. Backup and restore is now also available for Microsoft OneNote. This ...
A leading cybersecurity company has analyzed last year's phishing attacks and identified eight trends for 2025. Attackers are increasingly using advanced phishing attack methods to bypass security ...
SAP has published its January list of vulnerabilities, including two critical ones with a CVSS score of 9.9 out of 10, as well as three highly dangerous vulnerabilities ranging from 7.8 to 8.8 out of ...
The German economy underestimates the danger of cyber attacks. Not even half of industrial companies conduct regular cybersecurity training for their employees, according to the results of the "OT+IoT ...
In 2025, IT security teams will face major challenges: attacks will become more complex and digital attack surfaces will become larger. Trends such as AI-supported defense, securing hybrid working ...
Criminals are using Google Calendar to attack mailboxes. They use notifications to smuggle phishing emails past the security measures of many mailboxes. The hackers want to steal company data in order ...
Moxa, a provider of industrial switches, reports a critical vulnerability with a CVSS base score of 9.2 out of 10 in its security advisory. Hackers could gain access using brute force attacks. The ...
Data encryption is particularly topical at the moment due to, among other things, director liability, NIS2, DORA and the Trade Secrets Protection Act (GeschGehG). The white paper "The importance of ...
A new combined data security solution provides security teams and SOCs with robust data risk visibility and control to better detect threats to sensitive data and protect it. The solution combines the ...
Keeper Security's Risk Management Dashboard allows administrators to keep an eye on the company's security. Dynamic benchmarks help them identify and assess vulnerabilities and threats in real time.
A new survey of hackers shows that AI is not only helping hackers become more efficient, but that AI itself is "ripe for exploitation." Rarely can you ask a hacker, "What do you think?" when it comes ...