Tag: cyberattack
-
Cyberattack Hits Poland’s Nuclear Research Center
Poland’s National Centre for Nuclear Research recently experienced a targeted cyberattack aimed at its IT infrastructure. Security teams successfully thwarted the intrusion before malicious actors could compromise critical systems or access sensitive data. The facility, which houses the country’s sole operational nuclear reactor, maintained full operational continuity throughout the entire security incident. As cyber threats…
-
CamelClone Uses Public File-Sharing Sites in Government Cyberattacks
A new cyber espionage campaign dubbed Operation CamelClone, targeting government and strategic sectors across several geopolitically significant regions. The campaign abuses legitimate tools and public file”‘sharing platforms to deliver malware and steal sensitive data, making it harder for defenders to detect. The operation primarily targets organizations linked to government and national security interests. Industries affected…
-
Cyberangriff: Hacker attackieren polnischen Kernreaktor-Betreiber
Polens nationales Nuklearforschungszentrum bestätigt einen versuchten Cyberangriff auf die eigene IT. Erste Spuren weisen angeblich Richtung Iran. First seen on golem.de Jump to article: www.golem.de/news/cyberangriff-hacker-attackieren-polnischen-kernreaktor-betreiber-2603-206533.html
-
macOS-Nutzer geraten stärker ins Visier von Cyberkriminellen
Sicherheitsforscher beobachten eine zunehmende Zahl gezielter Angriffe auf macOS-Systeme. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/macos-nutzer-gerate-cyberkriminellen
-
»Eine ITStrategie für komplexe Landschaften zu entwickeln, sollte zu Jahresbeginn ganz oben auf der Agenda stehen« Warum Zero Trust und One Identity jetzt unverzichtbar sind
Die meisten Cyberangriffen in der EU finden in Deutschland statt, und die Schwachstellen in den IT-Infrastrukturen nehmen täglich zu. Viele Unternehmen stehen daher vor der Frage, wie sie ihre IT-Sicherheit strategisch neu ausrichten können. Im Interview stellen Stefan Rothmeier und Sebastian Fuchs von T.CON das Konzept »Zero Trust« vor und erläutern, wie die Umsetzung gelingt. First…
-
Attackers are exploiting AI faster than defenders can keep up, new report warns
Cybersecurity is entering “a new phase” as artificial intelligence tools have matured and given IT defenders significantly less time to respond to cyberattacks and other threats, according to a new report released Monday. The report, authored by federal contractor Booz Allen Hamilton, concludes that threat actors have adopted AI more quickly than governments and private…
-
Google Unveils Android 17 Advanced Protection Mode to Stop Malicious Services
Google is preparing to launch Android 17, introducing a comprehensive suite of new features aimed at fundamentally improving device security, user privacy, and performance debugging. At the forefront of this release is the highly anticipated Android Advanced Protection Mode (AAPM), a powerful new feature designed to safeguard users from increasingly sophisticated cyberattacks and stop malicious…
-
Google Unveils Android 17 Advanced Protection Mode to Stop Malicious Services
Google is preparing to launch Android 17, introducing a comprehensive suite of new features aimed at fundamentally improving device security, user privacy, and performance debugging. At the forefront of this release is the highly anticipated Android Advanced Protection Mode (AAPM), a powerful new feature designed to safeguard users from increasingly sophisticated cyberattacks and stop malicious…
-
Notfall-Onboarding scheitert ohne die richtige Vorbereitung – DDoS-Resilienz entscheidet sich schon lange vor dem Angriff
First seen on security-insider.de Jump to article: www.security-insider.de/ddos-resilienz-notfall-onboarding-vorbereitung-mitigation-a-4b513bede48cbe6b3cfa9017f8280abd/
-
Hackers tried to breach Poland’s nuclear research centre
Poland’s National Centre for Nuclear Research (NCBJ) thwarted a cyberattack targeting its IT infrastructure. The attempted intrusion was detected and blocked before attackers … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/16/poland-nuclear-research-centre-cyberattack/
-
IT-Sicherheit: Cyberangriffe kosten Autosektor über 20 Milliarden Dollar
Eine Analyse von CAM und Cisco zeigt: Die Schäden durch Cyberattacken im Automobilsektor haben sich seit 2022 verzwanzigfacht. First seen on golem.de Jump to article: www.golem.de/news/it-sicherheit-cyberangriffe-kosten-autosektor-ueber-20-milliarden-dollar-2603-206522.html
-
China Demands Proof After Costa Rica Blames UNC2814 for ICE Cyberattack
Tensions between China and Costa Rica have intensified following allegations tied to an ICE cyberattack that Costa Rican authorities say was linked to the cyberespionage group UNC2814. The dispute centers on a breach affecting Costa Rica’s state-run electricity and telecommunications provider and has quickly evolved from a domestic cybersecurity issue into a diplomatic disagreement involving competing narratives and…
-
Wie KI Cyberangriffe skaliert
Der Cloudflare Threat Report zeichnet das Bild einer hochgradig industrialisierten Bedrohungslandschaft, in der Effizienz und Skalierung wichtiger sind als technische Finesse. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/wie-ki-cyberangriffe-skaliert
-
Wie KI Cyberangriffe skaliert
Der Cloudflare Threat Report zeichnet das Bild einer hochgradig industrialisierten Bedrohungslandschaft, in der Effizienz und Skalierung wichtiger sind als technische Finesse. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/wie-ki-cyberangriffe-skaliert
-
Wie KI Cyberangriffe skaliert
Der Cloudflare Threat Report zeichnet das Bild einer hochgradig industrialisierten Bedrohungslandschaft, in der Effizienz und Skalierung wichtiger sind als technische Finesse. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/wie-ki-cyberangriffe-skaliert
-
Wie KI Cyberangriffe skaliert
Der Cloudflare Threat Report zeichnet das Bild einer hochgradig industrialisierten Bedrohungslandschaft, in der Effizienz und Skalierung wichtiger sind als technische Finesse. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/wie-ki-cyberangriffe-skaliert
-
Phishing-Angriffe zu Feiertagen: Ostern droht wieder ein saisonaler Höhepunkt
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/phishing-angriffe-feiertage-ostern-saisonal-hoehepunkt
-
Mikrosegmentierung: Neue Strategie für Prävention, Resilienz und Sicherheit
Mittels automatisierter Mikrosegmentierung können Unternehmen die möglichen Folgen eines Cyberangriffs effizient und effektiv eindämmen. Zero Networks analysierte über einen Zeitraum von zwölf Monaten (Dezember 2024 bis Dezember 2025) etwa 3,4 Billionen Aktivitäten in 400 Unternehmensumgebungen. Ziel war es, zu verstehen, wie sich erfolgreiche Cyberangriffe nach dem ersten Zugriff weiterentwickeln. Das Ergebnis: Die gefährlichsten Aktivitäten… First…
-
AiLock Ransomware Claims England Hockey Data Breach
England Hockey is investigating a potential cyberattack claimed by the AiLock ransomware group. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/ailock-ransomware-claims-england-hockey-data-breach/
-
Hackers targeted Poland’s National Centre for Nuclear Research
Hackers targeted Poland’s National Centre for Nuclear Research, but security systems detected and blocked the attack before any damage. The National Centre for Nuclear Research in Poland reported a cyberattack on its IT infrastructure. The intrusion attempt was quickly detected by security systems, allowing staff to secure the targeted systems and prevent any operational impact.…
-
How SMBs Can Proactively Strengthen Cybersecurity
Tags: access, attack, best-practice, business, ciso, compliance, control, cyber, cyberattack, cybercrime, cybersecurity, data, identity, infrastructure, resilience, risk, service, tool, updateCyber attackers increasingly target SMBs because they are often the easiest path into larger supply chains. As cyberattacks are ramping up, specifically against Critical Infrastructure sectors, Small and Medium Businesses (SMBs) are feeling the pressure and asking what they can do to better protect themselves in reasonable ways. Don’t Accept Failure SMBs often feel overwhelmed when…
-
How Main Line Health Secures Devices With Microsegmentation
An identity-based microsegmentation deployment at Main Line Health in Philadelphia is helping to control how its roughly 60,000 devices communicate across the network in order to protect clinical operations and limit the impact of potential cyberattacks, said Main Line Health CISO Aaron Weismann. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/how-main-line-health-secures-devices-microsegmentation-i-5539
-
Poland’s nuclear research centre targeted by cyberattack
Poland’s National Centre for Nuclear Research (NCBJ) says hackers targeted its IT infrastructure, but the attack was detected and blocked before causing any impact. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/polands-nuclear-research-centre-targeted-by-cyberattack/
-
Stryker’s manufacturing, shipping disrupted after cyberattack
Tags: cyberattackThe medtech company says it’s still experiencing issues with order processing, manufacturing and shipping.; First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/strykers-manufacturing-shipping-disrupted-cyberattack/814693/
-
Ransomware incident responder gave info to BlackCat cybercriminals during negotiations, DOJ alleges
U.S. prosecutors accused an incident responder of conducting cyberattacks and helping ransomware gangs negotiate higher payouts from the same victims he was working for. First seen on therecord.media Jump to article: therecord.media/ransomware-blackcat-doj-incident-responder
-
Iran-Linked Hacktivists Claim Destructive Cyberattack on Medtech Firm Stryker
A hacktivist group with alleged links to Iran’s intelligence agencies has claimed responsibility for a destructive cyberattack against Stryker, the Michigan-based global medical technology company, in an incident that reportedly disrupted operations across the company’s international network. News reports from Ireland, Stryker’s largest hub outside the United States, said the company sent more than 5,000…
-
The Cyber Express Weekly Roundup: Global Cyberattacks, Espionage, Malware, and Critical Security Updates
This week’s The Cyber Express weekly roundup highlights major cybersecurity developments affecting organizations, governments, and individuals worldwide. Key stories include destructive cyberattacks, such as system-wide wipes and targeted breaches, as well as state-backed cyber espionage targeting technology and research sectors. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/the-cyber-express-weekly-roundup-march/
-
Mehr staatliche Cyberangriffe auf europäische und nahöstliche Regierungen
Tags: cyberattackDer militärische Konflikt im Nahen Osten hat längst auch eine digitale Dimension erreicht. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/staatliche-cyberangriffe-europaische-regierungen
-
Die Grenzen des Pentestings: Simulierter Angriff, echte Schwäche
Viele Unternehmen haben Penetration Testing fest in ihrer Sicherheitsstrategie verankert. Das ist eine gute Basis, allerdings greift diese Maßnahme meist zu kurz. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cloud-security/die-grenzen-des-pentestings

