Category: SecurityNews
-
Rubrik skizziert Cyberresilienz Ausblick 2026
Im Jahr 2026 wird der Mythos zusammenbrechen, dass native Cloud-Tools ausreichend sind. Denn Unternehmen erkennen, dass ihre isolierten Multi-Cloud-Umgebungen die Cyber-Wiederherstellung erheblich verlangsamen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/rubrik-skizziert-cyberresilienz-ausblick-2026/a43257/
-
Cyber-Dome: Dobrindt plant Überwachung mit Gesichtserkennung
Tags: cyberBundesinnenminister Dobrindt will Behördenbefugnisse massiv ausweiten. Geplant sind Gesichtserkennung, IP-Vorratspeicherung und ein Cyberdome. First seen on golem.de Jump to article: www.golem.de/news/cyber-dome-dobrindt-plant-ueberwachung-mit-gesichtserkennung-2512-203503.html
-
What CISOs should know about the SolarWinds lawsuit dismissal
Responsibility without authority is the real risk: At the heart of the SolarWinds lawsuit was a familiar problem for security leaders: responsibility without authority. The dynamic that caught Tim Brown in the SEC’s jaws is that, despite his experience, seniority, and title, he, like most CISOs, carries tremendous responsibility without any real organizational authority to…
-
What CISOs should know about the SolarWinds lawsuit dismissal
Responsibility without authority is the real risk: At the heart of the SolarWinds lawsuit was a familiar problem for security leaders: responsibility without authority. The dynamic that caught Tim Brown in the SEC’s jaws is that, despite his experience, seniority, and title, he, like most CISOs, carries tremendous responsibility without any real organizational authority to…
-
Building cyber talent through competition, residency, and real-world immersion
In this Help Net Security interview, Chrisma Jackson, Director of Cybersecurity Mission Computing Center and CISO at Sandia National Laboratories, reflects on where the … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/22/chrisma-jackson-sandia-national-laboratories-recruiting-cybersecurity-professionals/
-
Browser agents don’t always respect your privacy choices
Browser agents promise to handle online tasks without constant user input. They can shop, book reservations, and manage accounts by driving a web browser through an AI model. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/22/browser-agents-privacy-risks-study/
-
Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale
Threat actors have been observed leveraging malicious dropper apps masquerading as legitimate applications to deliver an Android SMS stealer dubbed Wonderland in mobile attacks targeting users in Uzbekistan.”Previously, users received ‘pure’ Trojan APKs that acted as malware immediately upon installation,” Group-IB said in an analysis published last week. “Now, adversaries increasingly deploy First seen on…
-
Cybersicherheitsprognosen 2026 – Zehn Schritte für mehr KI-Sicherheit und weniger Komplexität im Jahr 2026
Tags: aiFirst seen on security-insider.de Jump to article: www.security-insider.de/ki-sicherheit-2026-zehn-schritte-gegen-komplexitaet-a-7bea4767b455e3dbab8f1117d414dd4a/
-
Partnerschaft – Zyxel bindet Avast-Endpunktschutz in USG-Flex-H-Firewalls ein
First seen on security-insider.de Jump to article: www.security-insider.de/zyxel-bindet-avast-endpunktschutz-in-usg-flex-h-firewalls-ein-a-306b599d7f5ea3e933a222bb60f8744e/
-
Partnerschaft – Zyxel bindet Avast-Endpunktschutz in USG-Flex-H-Firewalls ein
First seen on security-insider.de Jump to article: www.security-insider.de/zyxel-bindet-avast-endpunktschutz-in-usg-flex-h-firewalls-ein-a-306b599d7f5ea3e933a222bb60f8744e/
-
Partnerschaft – Zyxel bindet Avast-Endpunktschutz in USG-Flex-H-Firewalls ein
First seen on security-insider.de Jump to article: www.security-insider.de/zyxel-bindet-avast-endpunktschutz-in-usg-flex-h-firewalls-ein-a-306b599d7f5ea3e933a222bb60f8744e/
-
Drei Jahre lang hackbar: KI entdeckt kritische Sicherheitslücke in Nasa-Raumfahrzeugen
First seen on t3n.de Jump to article: t3n.de/news/hackbar-nasa-ki-1720652/
-
Anubis: Open-source web AI firewall to protect from scraper bots
Anubis is an open-source tool designed to protect websites from automated scraping and abusive traffic by adding computational friction before a request is served. Maintained … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/22/anubis-open-source-web-ai-firewall-protect-from-bots/
-
Session tokens give attackers a shortcut around MFA
In this Help Net Security video, Simon Wijckmans, CEO at cside, discusses why session token theft is rising and why security teams miss it. He walks through how web … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/22/session-token-theft-video/
-
Erpressung nach Smishing bei Analytics-Dienstleister – Pornhub meldet Diebstahl von Kundendaten Hacker drohen mit Leak
First seen on security-insider.de Jump to article: www.security-insider.de/pornhub-datenabfluss-mixpanel-shinyhunters-smishing-a-e567d92c5ab31a5c3e1900c16de81073/
-
Identitätsdiebstahl: So prüfst du, ob deine Daten im Darknet gelandet sind
Tags: dark-webFirst seen on t3n.de Jump to article: t3n.de/news/daten-im-darknet-gelandet-1689607/
-
Cyberkriminalität wird im Jahr 2026 vollständig industrialisiert
Tags: cybercrimeDer Cybersicherheitsanbieter Trend Micro beschreibt in seinem aktuellen Ausblick für 2026 einen tiefgreifenden Wandel der digitalen Bedrohungslandschaft. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/cyberkriminalitaet-2026-industrialisiert
-
Over and Out: Was haben Unternehmen aus den globalen IT-Ausfällen im Jahr 2025 gelernt?
Tags: aiDer Nachrichtenzyklus 2025 war geprägt von geopolitischen Ereignissen, wirtschaftlichen Schwankungen und Fortschritten in der KI, zugleich rückten jedoch erneut weitreichende, zunehmend globale IT-Ausfälle in den Fokus. Nachdem bereits 2024 einzelne Vorfälle zu systemischen Störungen eskaliert waren und die hohe Vernetzung digitaler Infrastrukturen samt Kettenreaktionen über Branchen und Länder hinweg offenlegten, deutet die Vielzahl hochkarätiger Ausfälle……
-
Podcast: Die IT-Tops und -Flops 2025
Tags: ai, cio, jobs, malware, microsoft, nis-2, open-source, ransomware, software, vulnerability-managementDie Redaktion von Computerwoche, CIO und CSO sieht das IT-Jahr 2025 mit gemischten Gefühlen zu Ende gehen.Ein turbulentes Jahr 2025 neigt sich dem Ende zu. Es war geprägt von wirtschaftlicher Unsicherheit, geopolitischen Spannungen und dem ungebremsten Siegeszug der Künstlichen Intelligenz. Grund genug für die Redaktion von Computerwoche, CIO und CSO, in der letzten TechTalk-Podcast-Folge des…
-
There’s so much stolen data in the world, South Korea will require face scans to buy a SIM
SK Telecom’s epic infosec faill will cost it another $1.5 billion First seen on theregister.com Jump to article: www.theregister.com/2025/12/22/south_korea_facial_verification/
-
NIST issues guidance on securing smart speakers
Smart home devices, such as voice-activated digital assistants, are increasingly used in home health care, with risks involved. An attacker could change a prescription, steal … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/12/22/nist-securing-smart-speakers/
-
Authentication Platform Comparison: Best Authentication Systems Tools for Your Business
Compare leading authentication platforms like Okta, Auth0, and open-source tools. Find the best authentication system for your business needs, balancing security, cost, and scalability. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/12/authentication-platform-comparison-best-authentication-systems-tools-for-your-business/
-
Handwritten Passwords for Touchscreen Devices
Explore handwritten passwords for touchscreen devices: a unique authentication method. Learn about security, usability, implementation, and how it compares to traditional passwords. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/12/handwritten-passwords-for-touchscreen-devices/
-
Android Security Update Triggers Renewed Attention with Mid-Month Changes
Google’s latest Android security updates are drawing renewed scrutiny this week as revisions, staggered patch rollouts, and follow-on fixes converge across the Android ecosystem. While the underlying security bulletin itself is not new, the way updates are landing on devices now is creating a sense of sudden disruption for users and security teams alike. At……
-
Shadows of the North: Unmasking the Sprawling Cyber Infrastructure of the DPRK
The post Shadows of the North: Unmasking the Sprawling Cyber Infrastructure of the DPRK appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/shadows-of-the-north-unmasking-the-sprawling-cyber-infrastructure-of-the-dprk/
-
The GRU’s Silent Shift: How BlueDelta Hijacks Ukrainian Webmail Using ngrok and Mocky
Tags: ukraineThe post The GRU’s Silent Shift: How BlueDelta Hijacks Ukrainian Webmail Using ngrok and Mocky appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/the-grus-silent-shift-how-bluedelta-hijacks-ukrainian-webmail-using-ngrok-and-mocky/
-
Waymo suspends service after power outage hit San Francisco
Tags: serviceWaymo temporarily halted its San Francisco robotaxi service after a major blackout left multiple autonomous vehicles stranded on city streets. Waymo temporarily halted its robotaxi service in San Francisco after a widespread blackout caused multiple autonomous vehicles to stall on city streets. “We have temporarily suspended our ride-hailing services in the San Francisco Bay Area…
-
Phishing-Hochsaison Weihnachten Bitdefender-Analyse zu ESpam
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/phishing-hochsaison-weihnachten-bitdefender-analyse-e-mail-spam

