Search
A free AI agent with no guardrails
The developments surrounding OpenClaw are generating equal parts fascination and serious security concern. The makings of a genuine enterprise nightmare are already visible.
Transparency alone is not enough
Operational resilience in OT environments requires concrete technical and organizational levers: access controls, robust test environments, and compensating measures for legacy systems. At the same time, the supply chain is moving to the center of attention as both an attack vector and a compliance factor.
Ad
Opportunity makes a thief
Anyone who believes ransomware groups meticulously select their targets based on industry, location, or strategic importance is usually mistaken.
Ad
New attack technique discovered
Passkeys and FIDO authentication are designed to provide robust protection against phishing attacks. However, researchers have now discovered a critical loophole that can undermine even strong passkey authentication. Attackers can exploit a targeted downgrade technique to force users into using insecure login methods. This risk grows as FIDO adoption
Ad
OPSWAT Threat Landscape Report 2025
A new report demonstrates that conventional security systems are failing to identify many contemporary threats. OPSWAT highlights critical blind spots in current defenses and advocates for a fundamental overhaul of cybersecurity strategies.
Back door for hackers
Security researchers from Check Point have discovered a serious vulnerability in the popular AI-based developer tool Cursor. The vulnerability allows attackers to permanently inject malicious code into development projects completely unnoticed.
Recipe for a disaster
From a harmless kitchen helper to a cyber threat – the case of the “RecipeLister” app shows how cleverly malware is disguised today.
Ad
21.04.2026
 - 22.04.2026
Nürnberg
28.04.2026
 - 29.04.2026
Baden-Württemberg
05.05.2026
 - 07.05.2026
Dubai
Ad

Most Read Articles

Ad
Ad
Ad