Search
Ad
Cyberattacks after US-Israel offensive
Following the joint US-Israel military strikes against Iran on February 28, 2026, the cyber front is escalating rapidly.
Ad
Criminals study cycles
Organisations assume cyber threats remain constant throughout the year, spreading risk evenly across all four quarters. This misconception leaves them vulnerable during a period when attackers are most active. 
PromptSpy: The malware that thinks
Security researchers at Slovak IT company ESET have discovered a new Android malware that actively leverages Google Gemini during live operation, marking the first time an Android threat has used generative AI not as a peripheral feature, but as its central control mechanism.
Ad
New attack technique discovered
Passkeys and FIDO authentication are designed to provide robust protection against phishing attacks. However, researchers have now discovered a critical loophole that can undermine even strong passkey authentication. Attackers can exploit a targeted downgrade technique to force users into using insecure login methods. This risk grows as FIDO adoption
Back door for hackers
Security researchers from Check Point have discovered a serious vulnerability in the popular AI-based developer tool Cursor. The vulnerability allows attackers to permanently inject malicious code into development projects completely unnoticed.
Ad
21.04.2026
 - 22.04.2026
Nürnberg
28.04.2026
 - 29.04.2026
Baden-Württemberg
05.05.2026
 - 07.05.2026
Berlin
Ad

Most Read Articles

Ad
Ad
Ad