Sicherheitsinfos

securitymagazine.comAfter years of breaches, stolen data, CIO/CISO resignations and huge impacts to business reputation, it’s time for the industry to rethink its approach to network security....

securitymagazine.comThe cyber threats facing Industrial Control Systems (ICS) include nation-state attacks, hacktivists, criminals and even trusted insiders. The frequency and ferocity of attacks are growing and continue to pose a major challenge to those ICS practitioners and cybersecurity teams tasked with protecting our critical national infrastructure (CNI)....

securitymagazine.comFor all the hundreds of firewall rules and network protocols that your security staff may put in place to better safeguard your network, sometimes there’s simply no accounting for the most unpredictable variable of them all: human behavior. Whether it be through social engineering techniques, bad actors within your own organization, or simple human error, hackers around the world are trained on how to take advantage of a company’s employees and staff in order to gain access to a protected network....

securitymagazine.comWith the barrage of information coming into a system, separating the noise from the genuine threats can be a difficult process. This is where AI can come in, to help you separate the real risks to your business from normal network noise....

securitymagazine.comAirbnb has released a new report detailing business travel trends which have been on the rise in 2018, and are set to continue in 2019....

securitymagazine.comAfter a tragic industry accident took the lives of 11 employees, Jacobs Engineering Group decided to completely reinvent their duty of care culture, which now protects 77,000 employees at home and abroad by providing tailored education, preparedness and awareness programs....

threatpost.comHackers can steal data, sabotage cloud deployments and more....

threatpost.comAdobe issued a patch for the zero-day on Wednesday....

threatpost.comThe facial recognition pilot will identify “subjects of interest" around the White House....

threatpost.comThe company allegedly tried to hide away new policy changes that would collect Android app users' call and message logs....

threatpost.comResearchers identified a widespread campaign of brute force attacks against WordPress websites....

threatpost.comMicrosoft and the AI Now Institute are both calling for regulation as facial recognition software picks up popularity....

threatpost.comInfosec Insider Derek Manky discusses how new technologies and economic models are facilitating fuzzing in today's security landscape....

threatpost.comThreat group moves away from “smash-and-grab” attacks and adopts a boutique approach to targeting victims....

threatpost.comA newly-passed Australian law could allow the government to force tech companies to create backdoors in their products....

threatpost.comWatch out for emails about gift cards and corporate donations, researcher warn....

Heise Sicherheits NewsLange wurde in den USA über die Hackerangriffe auf die Demokratische Partei diskutiert. Nun müssen die Republikaner eingestehen, dass es auch sie getroffen hat....

Heise Sicherheits NewsEine neue Abwandlung des Spectre-V1-Angriffs macht solche Attacken auf CPUs realistischer. Sie lässt sich über die JavaScript-Engine eines Browsers ausführen....

Heise Sicherheits NewsDie aktuelle Chrome-Version will Nutzer effektiver vor gefährlichen Websites schützen. Außerdem haben die Entwickler Sicherheitslücken geschlossen....

Heise Sicherheits NewsDer Passwortmanager von HashiCorp weiß im neuen Release mit Features wie Batch Tokens, OpenAPI-Support sowie einer überarbeiteten Oberfläche aufzuwarten....

Heise Sicherheits NewsBSI, CERT-Bund und Cybercrime-Spezialisten der LKAs sehen eine akute Welle von Infektionen mit Emotet, die Millionenschäden anrichtet....

Heise Sicherheits NewsEs gibt ein wichtiges Sicherheitsupdate für Adobes Flash Player. Nutzer sollten es dringend installieren....