Data Stealer SparkCat
Kaspersky experts have discovered a new Trojan hidden in apps in the AppStore and Google Play that has been active since at least March 2024.
Definition, tasks and salary
Cyber attacks, data theft and physical threats affect companies on a daily basis. That’s why the role of the Chief Security Officer (CSO) is more important than ever. But what exactly is behind this title?
Juniper Research: Quantum Key Distribution Market: 2025-2030
Quantum Key Distribution is revolutionizing IT security. The technology uses quantum mechanics for tap-proof communication. Juniper Research forecasts a market volume of 7.3 billion dollars by 2030.
Digital identity | Blockchain
Centralized digital identity systems have had their day – they are vulnerable to attacks, cost-intensive and rob users of control over their data. Technical Evangelist Debanjali Ghosh explains how blockchain technology is revolutionizing the management of digital identities.
Not responding to blackmail
Japanese electronics manufacturer Casio has published new details on the ransomware incident from October 2024. Following the conclusion of the investigation, it is now clear that the personal data of around 8,500 people was compromised.
Operation DreamJob
Lazarus’ key operation – “Operation DreamJob” – continues to evolve with new sophisticated tactics that have persisted for more than five years, according to Kaspersky’s Global Research and Analysis Team.
Quantum computer
Quantum computers will fundamentally change the way we look at humanity’s most complex problems. They promise new insights, from materials science to medicine and climate research. However, this future technology is also challenging established standards in cyber security.
Falsified reality
Everyone has heard or read about them, and some people may even have fallen for them: Deepfakes are increasingly blurring the boundaries between reality and fiction and pose a significant threat to the reliability of our digital identity.
Complexity of operations
Since 2023, Earth Estries has evolved into one of the most aggressive Chinese advanced persistent threat (APT) groups, primarily targeting critical industries such as telecommunications companies and government agencies in the US, Asia-Pacific, the Middle East and South Africa.
A.T.U Auto-Teile-Unger GmbH & Co. KG
Weiden in der Oberpfalz, Home Office
IT-Dienstleistungszentrum (ITDZ Berlin)
Berlin
Akkodis Germany Tech Experts GmbH
Dresden
Meistgelesene Artikel
1. Dezember 2025
1. Dezember 2025
19. November 2025
19. November 2025
15. November 2025