Blackout by AI
In an unusually specific forecast, renowned research and advisory firm Gartner is warning of an impending catastrophic scenario.
A free AI agent with no guardrails
The developments surrounding OpenClaw are generating equal parts fascination and serious security concern. The makings of a genuine enterprise nightmare are already visible.
Transparency alone is not enough
Operational resilience in OT environments requires concrete technical and organizational levers: access controls, robust test environments, and compensating measures for legacy systems. At the same time, the supply chain is moving to the center of attention as both an attack vector and a compliance factor.
OPSWAT Threat Landscape Report 2025
A new report demonstrates that conventional security systems are failing to identify many contemporary threats. OPSWAT highlights critical blind spots in current defenses and advocates for a fundamental overhaul of cybersecurity strategies.
Rethinking security strategy
The days when cyber security was an afterthought are over. The EU Cyber Resilience Act (CRA) and the EU’s new Product Liability Directive make it clear: software must be secure from the outset. “Security by design” is thus turning from a buzzword into a survival strategy. Cycode shows how
Nationwide cyber attack in the USA
The series Zero Day deals with the current cyber threat landscape and addresses the consequences of a large-scale cyberattack in the USA. For exactly one minute, electricity, mobile networks, server systems, traffic control systems, and air traffic control systems fail simultaneously across the entire country. The attack costs over
Study by Naoris Protocol
A recent global study by Naoris Protocol shows: Most IT directors do not believe their companies are adequately prepared for the threats posed by quantum computing. At the same time, 83 percent consider decentralized systems to be more secure than traditional centralized cybersecurity solutions.
Definition, tasks and salary
Cyber attacks, data theft and physical threats affect companies on a daily basis. That’s why the role of the Chief Security Officer (CSO) is more important than ever. But what exactly is behind this title?
Ubuntu Server
Researchers from the Qualys Threat Research Unit have discovered five vulnerabilities in the Ubuntu standard component “needrestart”. The vulnerabilities allow local privilege escalation (LPE) on affected systems.
Most Read Articles
4. March 2026
27. February 2026
26. February 2026
24. February 2026
24. February 2026