Search
Criminals study cycles
Organisations assume cyber threats remain constant throughout the year, spreading risk evenly across all four quarters. This misconception leaves them vulnerable during a period when attackers are most active. 
Ad
Breakout time shrinks
Attackers now need an average of just 29 minutes to move laterally through a network after gaining initial access, a 65 percent acceleration compared to the previous year.
Ad
PromptSpy: The malware that thinks
Security researchers at Slovak IT company ESET have discovered a new Android malware that actively leverages Google Gemini during live operation, marking the first time an Android threat has used generative AI not as a peripheral feature, but as its central control mechanism.
A new quality of malware
Researchers from security company ESET have discovered an unusual malware that uses artificial intelligence in a new way.
Ad
New attack technique discovered
Passkeys and FIDO authentication are designed to provide robust protection against phishing attacks. However, researchers have now discovered a critical loophole that can undermine even strong passkey authentication. Attackers can exploit a targeted downgrade technique to force users into using insecure login methods. This risk grows as FIDO adoption
Back door for hackers
Security researchers from Check Point have discovered a serious vulnerability in the popular AI-based developer tool Cursor. The vulnerability allows attackers to permanently inject malicious code into development projects completely unnoticed.
Recipe for a disaster
From a harmless kitchen helper to a cyber threat – the case of the “RecipeLister” app shows how cleverly malware is disguised today.
Ad
17.03.2026
 - 18.03.2026
Hamburg
18.03.2026
 - 19.03.2026
Berlin
21.04.2026
 - 22.04.2026
Nürnberg
Ad

Most Read Articles

Ad
Ad
Ad