Gigabud and Spynote
Zimperium has published new findings on a security-critical malware campaign that combines features of two malicious programs.
Zimperium researchers’ research shows that both Gigabud and Spynote samples are currently being distributed via domains with similar structures and subdomains.
Automated API abuse by bots
Thales publishes the report “Economic Impact of API and Bot Attacks”.
Analysis of cybersecurity incidents reveals the rising global cost of insecure APIs and automated bot abuse, two security threats that are increasingly interconnected and widespread.
it-sa Special
In the increasingly digitalized industrial landscape, the challenges in cybersecurity have grown considerably in recent years.
The increase in targeted cyberattacks on operational technology (OT), i.e. control systems, devices and components in production facilities, is particularly worrying.
OT and IT must work closely together to ensure effective cybersecurity.
Guide for more safety
CIOs and CISOs are coming under pressure from various directions.
Mark Molyneux, EMEA CTO at Cohesity, provides recommendations in a guide on how companies can meet the following challenges.
Offline calculator
Experts at Ben-Gurion University of the Negev have hacked offline computers – i.e. systems that are not connected to a network such as the Internet.
Increase API security
Cequence publishes explosive new data regarding the security of tour operator and hotel industry websites.
Cybercriminals are increasingly using the increased traffic during the vacation season as a cover for their attacks.
New cyber threat
A new threat to IT security is emerging in the current threat landscape.
Cybercriminals are increasingly resorting to the widespread but often overlooked function of scheduled tasks in Windows to carry out malicious activities undetected.
Sensitive data disclosed
A massive data leak at a Florida-based recruitment agency has affected thousands of hospitals and medical professionals.
Goes faster than you think
With modern IT security technologies, companies can quickly implement Zero Trust solutions.
Three examples show how they enable their employees to safely access cloud applications and company-owned applications from anywhere and surf the web without risk.
Most Read Articles
4. March 2026
27. February 2026
26. February 2026
24. February 2026