Search
NIS2 and Co.
Companies are currently facing a wave of new regulations in the area of IT security. These developments are a reaction to the increasing threats posed by cyber attacks and the growing importance of securing networks and infrastructures.
Ad
The unmasking of the Styx Stealer
Check Point encountered a curious malware case: The security researchers at Check Point Research (CPR) discovered that the developer of the new malware Styx Stealer made a serious mistake during debugging that leaked data from his computer.
Ad
Industrial Control Systems (ICS)
Thousands of industrial control systems (ICS) in the USA and the UK are vulnerable to cyber attacks. Critical infrastructure, such as the water supply, is also affected.
Ad
The latest analysis from Cato CTRL reveals alarming developments in the cybersecurity landscape. The threat actor “IntelBroker” emerges as a central figure in selling stolen data and source code, and also plays a prominent role in hacking forums.
Advanced Persistent Threats (APT)
The FBI has launched an investigation after Donald Trump’s presidential campaign claimed to have been attacked by Iranian hackers. Proofpoint security researcher Joshua Miller explains the possible background.
Data security
Comprehensive and correct classification is fundamental for data security. Only if you know which data is (particularly) worth protecting can you implement appropriate measures. This is all the more important in times of AI assistants such as Microsoft Copilot.
The introduction of the Human Risk OS
Safety awareness and training are essential for a proactive safety culture. With SoSafe’s fully integrated human risk management solution, safety managers can holistically identify, prioritize and effectively reduce human safety risks.
Ad
21.04.2026
 - 22.04.2026
Nürnberg
28.04.2026
 - 29.04.2026
Baden-Württemberg
05.05.2026
 - 07.05.2026
Berlin
Ad

Most Read Articles

Ad
Ad
Ad