New cyber threat
A new threat to IT security is emerging in the current threat landscape.
Cybercriminals are increasingly resorting to the widespread but often overlooked function of scheduled tasks in Windows to carry out malicious activities undetected.
Sensitive data disclosed
A massive data leak at a Florida-based recruitment agency has affected thousands of hospitals and medical professionals.
Statement
When it comes to the duration of a ransomware attack and the subsequent recovery process, the numbers are staggering and vary widely. This is partly due to the fact that there is no single source that summarizes all the information in a uniform way.
Study on cyber security in companies
In today’s digitally networked world, companies are increasingly the target of cyber attacks.
Attackers are primarily targeting managers, who are a particularly attractive target group due to their access to sensitive data and extensive rights within IT systems.
Onapsis study
Onapsis publishes its new study “ERP security in times of AI-supported ransomware”.
The results are based on a survey of 500 cybersecurity decision-makers in companies with 500 or more employees in the DACH region and the UK.
The unmasking of the Styx Stealer
Check Point encountered a curious malware case: The security researchers at Check Point Research (CPR) discovered that the developer of the new malware Styx Stealer made a serious mistake during debugging that leaked data from his computer.
Security breach or hysteria?
An alleged hack at data broker National Public Data (NPD) made headlines this week for potentially exposing billions of social security numbers. Real leak or hysteria?
Industrial Control Systems (ICS)
Thousands of industrial control systems (ICS) in the USA and the UK are vulnerable to cyber attacks. Critical infrastructure, such as the water supply, is also affected.
The latest analysis from Cato CTRL reveals alarming developments in the cybersecurity landscape. The threat actor “IntelBroker” emerges as a central figure in selling stolen data and source code, and also plays a prominent role in hacking forums.
Most Read Articles
4. March 2026
27. February 2026
26. February 2026
24. February 2026