Suche
System hacked
Flax Typhoon
Various cyber security agencies and authorities such as the FBI, the Cyber National Mission Force (CNMF), the NSA and the NCSC have uncovered a botnet with more than 260,000 devices worldwide.
Sowing discord
US intelligence agencies and the Federal Bureau of Investigation (FBI) have published new findings about the hacker access from Iran to internal communications of Republican presidential candidate Donald Trump’s campaign team that became public in August.
Anzeige
Guide for more safety
CIOs and CISOs are coming under pressure from various directions. Mark Molyneux, EMEA CTO at Cohesity, provides recommendations in a guide on how companies can meet the following challenges.
Anzeige
Offline calculator
Experts at Ben-Gurion University of the Negev have hacked offline computers – i.e. systems that are not connected to a network such as the Internet.
Sensitive data disclosed
A massive data leak at a Florida-based recruitment agency has affected thousands of hospitals and medical professionals.
Anzeige
Study on cyber security in companies
In today’s digitally networked world, companies are increasingly the target of cyber attacks. Attackers are primarily targeting managers, who are a particularly attractive target group due to their access to sensitive data and extensive rights within IT systems.
Wrong investment tips
Fraudsters are constantly coming up with new tricks to scam money from internet users. Now fake videos are doing the rounds in which supposed celebrities advertise investments, including SAP co-founder Dietmar Hopp.
Microsoft Office alternative
The IT security provider ESET has discovered two security vulnerabilities in the Microsoft Office alternative WPS Office for Windows. The vulnerability CVE-2024-7262 in the Office application enabled the hacker group APT-C-60 to use an exploit to execute foreign code on its victims’ devices.
700,000 US dollars in Bitcoin
Computer engineer Daniel Rhyne is said to have launched a massive cyberattack against his own employer. Rhyne, who worked as a virtual machine (VM) expert at the company, used his position to secretly create a virtual machine on the company’s network.
Anzeige
Anzeige