A large, global survey asked companies about their SOCs and cyber attacks. It showed that many companies are unable to process all security alerts in one day. As demands continue to increase, SOC ...
As the website Tarnkappe.info reports, the Sliver-Implant Trojan is targeting companies. Malware is hidden in Windows link files (LNK), which then gains access to the systems. The attack is primarily ...
In 2025, IT security teams will face major challenges: attacks will become more complex and digital attack surfaces will become larger. Trends such as AI-supported defense, securing hybrid working ...
The currently evaluated threat index from December shows the threat posed by FunkSec, a ransomware group that operates with AI. In Germany, Formbook is becoming more and more inactive, while other ...
Five trends will influence the IT security landscape in 2025. It will continue to grow in complexity, and new technologies such as AI or quantum computing will bring both opportunities and risks.
Endpoint management is constantly evolving and becoming more complex, presenting IT teams with new challenges. AI-based tools, intelligent workflows and proactive, automated management can help ...
The 365 Total Backup solution enables end users to restore their mailbox and OneDrive data independently without IT training. Backup and restore is now also available for Microsoft OneNote. This ...
SAP has published its January list of vulnerabilities, including two critical ones with a CVSS score of 9.9 out of 10, as well as three highly dangerous vulnerabilities ranging from 7.8 to 8.8 out of ...
A leading cybersecurity company has analyzed last year's phishing attacks and identified eight trends for 2025. Attackers are increasingly using advanced phishing attack methods to bypass security ...
In 2025, IT security teams will face major challenges: attacks will become more complex and digital attack surfaces will become larger. Trends such as AI-supported defense, securing hybrid working ...
Criminals are using Google Calendar to attack mailboxes. They use notifications to smuggle phishing emails past the security measures of many mailboxes. The hackers want to steal company data in order ...
The German economy underestimates the danger of cyber attacks. Not even half of industrial companies conduct regular cybersecurity training for their employees, according to the results of the "OT+IoT ...