Microsoft Research Asia recently presented an artificial intelligence called VASA-1, which is able to generate highly realistic deepfake videos from a single photo and an audio clip.
Efficient security strategy
Even the strongest IT system is only as strong as its weakest security vulnerability.
Unfortunately, the number of such vulnerabilities is constantly increasing – in fact, it has more than tripled in the last ten years.
EU push
At a time when cyber threats are bigger and more sophisticated than ever, the European Union (EU) has taken an important step towards strengthening its digital defenses with the introduction of the Network and Information Security Directive (NIS2).
IDaaS-Plattform
Entrust announces the expansion of its portfolio: The Identity as a Service (IDaaS) platform will integrate identity verification and identity and access management into a single solution to combat deepfakes, phishing, account takeover attacks and other threats.
Study
A new study by Zscaler examines the current state of implementation of NIS 2. The results of a survey of 875 IT executives in Europe show a discrepancy between the confidence of European organizations to achieve compliance with the regulations and the understanding of the requirements.
Thousands of SAP applications at risk
Security experts have identified a serious security vulnerability in SAP NetWeaver that allows unauthorized access to company systems. The vulnerability became known in April 2025 and specifically affects the Visual Composer component of SAP Java systems.
Rethinking security strategy
The days when cyber security was an afterthought are over. The EU Cyber Resilience Act (CRA) and the EU’s new Product Liability Directive make it clear: software must be secure from the outset. “Security by design” is thus turning from a buzzword into a survival strategy. Cycode shows how
Nationwide cyber attack in the USA
The series Zero Day deals with the current cyber threat landscape and addresses the consequences of a large-scale cyberattack in the USA. For exactly one minute, electricity, mobile networks, server systems, traffic control systems, and air traffic control systems fail simultaneously across the entire country. The attack costs over
Study by Naoris Protocol
A recent global study by Naoris Protocol shows: Most IT directors do not believe their companies are adequately prepared for the threats posed by quantum computing. At the same time, 83 percent consider decentralized systems to be more secure than traditional centralized cybersecurity solutions.
Definition, tasks and salary
Cyber attacks, data theft and physical threats affect companies on a daily basis. That’s why the role of the Chief Security Officer (CSO) is more important than ever. But what exactly is behind this title?
Falsified reality
Everyone has heard or read about them, and some people may even have fallen for them: Deepfakes are increasingly blurring the boundaries between reality and fiction and pose a significant threat to the reliability of our digital identity.
Ubuntu Server
Researchers from the Qualys Threat Research Unit have discovered five vulnerabilities in the Ubuntu standard component “needrestart”. The vulnerabilities allow local privilege escalation (LPE) on affected systems.
Interview
Ulrich Parthier, Publisher of it security, spoke with John Kindervag, Chief Evangelist at Illumio and Founder of Zero Trust, about Zero Trust and its role in the face of current cyber threats.
Winners honored at "it-sa 2024"
The winners of the it security Awards 2024 have been announced. They were awarded in the categories Management Security, Internet/Web Security, Cloud Security and IAM. The following manufacturers were honored: Abstract Security, Lasso Security, BxC-Consulting and Nokod Security.
Events
Veranstaltungen
Most read articles.
3. June 2025
3. June 2025
28. May 2025
26. May 2025