Transparency alone is not enough
Operational resilience in OT environments requires concrete technical and organizational levers: access controls, robust test environments, and compensating measures for legacy systems. At the same time, the supply chain is moving to the center of attention as both an attack vector and a compliance factor.
Opportunity makes a thief
Anyone who believes ransomware groups meticulously select their targets based on industry, location, or strategic importance is usually mistaken.
A new quality of malware
Researchers from security company ESET have discovered an unusual malware that uses artificial intelligence in a new way.
Study
Researchers have tested the effectiveness of various phishing training courses in a study involving 19,000 test subjects. The result: training courses help less than expected.
New attack technique discovered
Passkeys and FIDO authentication are designed to provide robust protection against phishing attacks. However, researchers have now discovered a critical loophole that can undermine even strong passkey authentication. Attackers can exploit a targeted downgrade technique to force users into using insecure login methods. This risk grows as FIDO adoption
OPSWAT Threat Landscape Report 2025
A new report demonstrates that conventional security systems are failing to identify many contemporary threats. OPSWAT highlights critical blind spots in current defenses and advocates for a fundamental overhaul of cybersecurity strategies.
Back door for hackers
Security researchers from Check Point have discovered a serious vulnerability in the popular AI-based developer tool Cursor. The vulnerability allows attackers to permanently inject malicious code into development projects completely unnoticed.
New cyber espionage campaign
Security researchers at Arctic Wolf Labs have discovered a sophisticated cyberattack campaign targeting the Turkish defense industry.
Recipe for a disaster
From a harmless kitchen helper to a cyber threat – the case of the “RecipeLister” app shows how cleverly malware is disguised today.
Most Read Articles
31. March 2026
30. March 2026
19. March 2026