From technically sophisticated to disturbingly creative
The infamous Trojan from 2019 is once again making headlines. Security researchers from ESET have discovered that AsyncRAT is now even more dangerous and has spread much more widely thanks to new variants.
Data from various Infostealers
Several collections of login data reveal one of the largest data thefts in history. As cybernews reports, a total of 16 billion login credentials were exposed. The data most likely originated from various infostealers.
Strategy, opportunities and risks of the digital transformation
Through targeted acquisitions, massive investments in AI and the clever linking of cloud services with security solutions, the Group is conquering a market that was traditionally dominated by specialists. This development promises companies cost benefits and simplified management – but at the same time raises questions about dependencies and
BeyondTrust Report 2025 warns
Microsoft is increasingly in the crosshairs of hackers. According to the latest Microsoft Vulnerabilities Report from security company BeyondTrust, a total of 1,360 vulnerabilities were recorded in Microsoft systems in 2024 – more than ever before.
Thousands of SAP applications at risk
Security experts have identified a serious security vulnerability in SAP NetWeaver that allows unauthorized access to company systems. The vulnerability became known in April 2025 and specifically affects the Visual Composer component of SAP Java systems.
Rethinking security strategy
The days when cyber security was an afterthought are over. The EU Cyber Resilience Act (CRA) and the EU’s new Product Liability Directive make it clear: software must be secure from the outset. “Security by design” is thus turning from a buzzword into a survival strategy. Cycode shows how
Incident response plan necessary
ClickFix is already being used by a number of nation-state actors such as APT 28 and Kimsuky. The distribution of stealer malware such as Lumma Stealer via the social engineering campaign is particularly popular.
Session tokens are also recorded
Security researchers from Sophos X-Ops have investigated the workings of Evilginx. The malware, which is based on the widely used open source web server nginx, poses a significant threat to IT security by enabling targeted adversary-in-the-middle attacks and can even bypass multi-factor authentication (MFA).
Germany affected
Security researchers from Kaspersky have discovered a particularly sophisticated variant of the Triada Trojan on imitation Android smartphones. More than 2,600 users worldwide, including in Germany, are affected.
Schloz Wöllenstein Services GmbH & Co. KG
Chemnitz
Technische Hochschule Köln
Köln
Meistgelesene Artikel
25. März 2026
14. März 2026