Suche
GitHub, Gitlab and Bitbucket affected
Aqua Security, a provider in the field of Cloud Native Security, publishes a new study showing how secret data such as login credentials, API tokens, and passkeys from organizations can remain openly accessible for years in the Git-based infrastructure of most source code management systems (SCMs).
Commentary
Since the release of ChatGPT, cybersecurity experts have been wondering how to control the falsification of GenAI. They initially assumed a threat scenario, namely that the output of GenAI is already being distorted by data poisoning.
Anzeige
Increase in cases of fraud
According to the Flashpoint 2024 Global Threat Intelligence Report, hackers stole an almost unbelievable amount of information in 2023 alone: 17 billion pieces of personal data were compromised. This is four times more than in the previous year and affects millions of people.
Anzeige
Utilizing the growing talent pool
As hackers become more skilled, the fight against cybercrime is becoming increasingly challenging. This problem transcends industry boundaries and affects small and medium-sized enterprises (SMEs), large corporations and the public sector alike.
Study
A new study by Zscaler examines the current state of implementation of NIS 2. The results of a survey of 875 IT executives in Europe show a discrepancy between the confidence of European organizations to achieve compliance with the regulations and the understanding of the requirements.
IDaaS-Plattform
Entrust announces the expansion of its portfolio: The Identity as a Service (IDaaS) platform will integrate identity verification and identity and access management into a single solution to combat deepfakes, phishing, account takeover attacks and other threats.
Anzeige
EU push
At a time when cyber threats are bigger and more sophisticated than ever, the European Union (EU) has taken an important step towards strengthening its digital defenses with the introduction of the Network and Information Security Directive (NIS2).
Efficient security strategy
Even the strongest IT system is only as strong as its weakest security vulnerability. Unfortunately, the number of such vulnerabilities is constantly increasing – in fact, it has more than tripled in the last ten years.
Anzeige
21.04.2026
 - 22.04.2026
Nürnberg
28.04.2026
 - 29.04.2026
Baden-Württemberg
05.05.2026
 - 07.05.2026
Berlin
Landkreis Stade
Stade
4Players GmbH
Hamburg, Home Office
Schloz Wöllenstein Services GmbH & Co. KG
Chemnitz
LichtBlick SE
Hamburg
Zweckverband Abfallwirtschaft Region Trier (A.R.T.)
Trier
Anzeige

Meistgelesene Artikel

Anzeige
Anzeige
Anzeige
Anzeige