Study
A new study by Zscaler examines the current state of implementation of NIS 2. The results of a survey of 875 IT executives in Europe show a discrepancy between the confidence of European organizations to achieve compliance with the regulations and the understanding of the requirements.
10 international arrest warrants, 4 arrests
Investigators are talking about the biggest strike against cyber criminals: more than 100 servers have been confiscated and 1300 domains put out of operation in an operation in several countries worldwide.
New malware discovered
A new threat has emerged on the cybercrime scene that is specifically targeting ATMs in Europe and could therefore endanger the entire banking industry. The malware, known as “EU ATM Malware”, was recently offered for sale on a hacker forum.
Report
Password-related cyberattacks through malware infections are at the top of the list of the most popular attacks. Nearly 31 percent of all security breaches analyzed by the Verizon DBIR team since 2013 have been related to stolen credentials.
Frustration instead of benefits?
A Google security manager has spoken out against simulated phishing exercises for employees.
Such tests would create frustration rather than more security awareness.
IDaaS-Plattform
Entrust announces the expansion of its portfolio: The Identity as a Service (IDaaS) platform will integrate identity verification and identity and access management into a single solution to combat deepfakes, phishing, account takeover attacks and other threats.
Analysis
Akira (or Akira Ransomware) is fast becoming one of the fastest growing ransomware families, utilizing a double extortion tactic, a Ransomware-as-a-Service (RaaS) distribution model and unique payment options.
EU push
At a time when cyber threats are bigger and more sophisticated than ever, the European Union (EU) has taken an important step towards strengthening its digital defenses with the introduction of the Network and Information Security Directive (NIS2).
Efficient security strategy
Even the strongest IT system is only as strong as its weakest security vulnerability.
Unfortunately, the number of such vulnerabilities is constantly increasing – in fact, it has more than tripled in the last ten years.
A.T.U Auto-Teile-Unger GmbH & Co. KG
Weiden in der Oberpfalz, Home Office
Akkodis Germany Tech Experts GmbH
Dresden
Meistgelesene Artikel
1. Dezember 2025
1. Dezember 2025
19. November 2025
19. November 2025
15. November 2025