Search
Ransomware group develops brute force framework
The ransomware group BlackBasta has developed a powerful tool to automate brute force attacks on edge network devices such as firewalls and VPNs. The framework, called “BRUTED”, allows attackers to crack targeted credentials and scale ransomware attacks on vulnerable networks.
Nationwide cyber attack in the USA
The series Zero Day deals with the current cyber threat landscape and addresses the consequences of a large-scale cyberattack in the USA. For exactly one minute, electricity, mobile networks, server systems, traffic control systems, and air traffic control systems fail simultaneously across the entire country. The attack costs over
Ad
Cyber espionage on a new level
The notorious advanced persistent threat (APT) group SideWinder has refined its attack tactics and significantly expanded its geographical reach. According to recent analyses by Kaspersky, the group is now specifically targeting nuclear power plants and energy facilities.
Ad
Best Practices
Since the discovery of LLMJacking by the Sysdig Threat Research Team (TRT) in May 2024, this threat vector has evolved rapidly. Just as large language models (LLMs) are constantly improving and finding new applications, cybercriminals are also adapting and using new ways to gain unauthorized access to these powerful
Study by Naoris Protocol
A recent global study by Naoris Protocol shows: Most IT directors do not believe their companies are adequately prepared for the threats posed by quantum computing. At the same time, 83 percent consider decentralized systems to be more secure than traditional centralized cybersecurity solutions.
Data Stealer SparkCat
Kaspersky experts have discovered a new Trojan hidden in apps in the AppStore and Google Play that has been active since at least March 2024.
Ad
Definition, tasks and salary
Cyber attacks, data theft and physical threats affect companies on a daily basis. That’s why the role of the Chief Security Officer (CSO) is more important than ever. But what exactly is behind this title?
Digital identity | Blockchain
Centralized digital identity systems have had their day – they are vulnerable to attacks, cost-intensive and rob users of control over their data. Technical Evangelist Debanjali Ghosh explains how blockchain technology is revolutionizing the management of digital identities.
Quantum computer
Quantum computers will fundamentally change the way we look at humanity’s most complex problems. They promise new insights, from materials science to medicine and climate research. However, this future technology is also challenging established standards in cyber security.
Complexity of operations
Since 2023, Earth Estries has evolved into one of the most aggressive Chinese advanced persistent threat (APT) groups, primarily targeting critical industries such as telecommunications companies and government agencies in the US, Asia-Pacific, the Middle East and South Africa.
Ad
21.04.2026
 - 22.04.2026
Nürnberg
28.04.2026
 - 29.04.2026
Baden-Württemberg
05.05.2026
 - 07.05.2026
Berlin
Ad

Most Read Articles

Ad
Ad
Ad