A series of campaigns that began in August aim to defraud job candidates, using psychological tactics and data scraped from LinkedIn profiles.
Ten finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year. Geordie AI wins the 2026 contest.
Organizations disclose attack details, though information may be limited, following a breach, but what if they did the same with close calls?
Die Entwickler von MariaDB haben eine Sicherheitslücke geschlossen. Ein Patch ist verfügbar.
Attacks by artificial intelligence agents are a reality. Experts at Nvidia’s GTC conference say defenders need to use the same tools to fight them off.
Acht Tage lang bombardierten DDoS-Angreifer 2025 ein Ziel ohne Pause, der längste Angriff, den Link11 jemals dokumentierte. Im selben Jahr standen an 88 Prozent der Tage Unternehmen durch DDoS-Angriffe unter Beschuss. Was früher die Ausnahme war, ist heute der Regelbetrieb: Terabit-Attacken über Tage hinweg zwingen zum Umdenken in der DDoS-Abwehr.
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2026-Adresse geschuetzt This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities […]
Four former NSA chiefs representing a near-complete history of US Cyber Command debate the role of offensive cyber in the government at RSAC.
A telemetry pipeline has become a core layer in modern security operations because teams no longer send data from applications, infrastructure, and cloud services straight into a single backend and hope for the best. In 2026, most environments are distributed across cloud, hybrid, and on-prem systems, which means more services, more data sources, more formats, […]