Seite wählen



Nordkorea: Hacker für Kim Jong Un erbeuten Rekordsummen für Atomprogramm – Uno-Bericht

Spiegel Online 07.02.2023 4:02
73 Raketen feuerte Nordkorea im vergangenen Jahr ab – und droht immer unverhohlener mit Atomwaffen. Finanziert wird das vor allem durch Hackerangriffe. Ein Uno-Bericht gibt nun Einblick in Kim Jong Uns Cyberarmee.

How Cybercriminals Are Operationalizing Money Laundering and What to Do About It

Dark Reading 06.02.2023 16:00
It’s time to share threat intelligence and prioritize digital literacy and cyber hygiene to stem the rising money laundering tide.

Italien, USA, Frankreich: Großer Cyberangriff zielt auf zwei Jahre alte Lücke

Golem 06.02.2023 10:43
Eigentlich wurde die Lücke in VMWare ESXi schon Anfang 2021 behoben. Die Arbeit machten sich viele Firmen nicht. Nun haben sie Probleme. (Cybercrime, Virtualisierung)


What CISOs Can Do About Brand Impersonation Scam Sites

Dark Reading 03.02.2023 23:04
Apply these nine tips to proactively fight fraudulent websites that use your brand to rip people off.

Das sollten Sie unbedingt lesen:

How the Cloud Is Shifting CISO Priorities

Dark Reading 03.02.2023 16:00
The greatly expanding attack surface created by the cloud needs to be protected.

Iranian OilRig Hackers Using New Backdoor to Exfiltrate Data from Govt. Organizations

The Hacker News 03.02.2023 13:12
The Iranian nation-state hacking group known as OilRig has continued to target government organizations in the Middle East as part of a cyber espionage campaign that leverages a new backdoor to exfiltrate data.
"The campaign abuses legitimate but compromised email accounts to send stolen data to external mail accounts controlled by the attackers," Trend Micro researchers Mohamed Fahmy, Sherif

Manipulating Weights in Face-Recognition AI Systems

Schneier on Security 03.02.2023 13:07
Interesting research: “Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons“:
Abstract: In this paper we describe how to plant novel types of backdoors in any facial recognition model based on the popular architecture of deep Siamese neural networks, by mathematically changing a small fraction of its weights (i.e., without using any additional training or optimization). These backdoors force the system to err only on specific persons which are preselected by the attacker. For example, we show how such a backdoored system can take any two images of a particular person and decide that they represent different persons (an anonymity attack), or take any two images of a particular pair of persons and decide that they represent the same person (a confusion attack), with almost no effect on the correctness of its decisions for other persons. Uniquely, we show that multiple backdoors can be independently installed by multiple attackers who may not be aware of each other’s existence with almost no interference…


Datentransfer in die USA: EU-Kommission veröffentlicht Nachfolger für Privacy Shield

Golem 13.12.2022 21:46
Der Datenaustausch mit den USA soll mit der Angemessenheitsentscheidung der EU-Kommission eine neue rechtliche Grundlage erhalten. (Privacy Shield, Datenschutz)

Security Flaw in Atlassian Products Affecting Multiple Companies

Dark Reading 13.12.2022 18:00
Jira, Confluence,Trello, and BitBucket affected.

The Cybersecurity Industry Doesn't Have a Stress Problem — It Has a Leadership Problem

Dark Reading 13.12.2022 16:00
Organizations need servant leaders to step forward and make their teams‘ professional effectiveness and happiness a priority.

Cybersecurity Experts Uncover Inner Workings of Destructive Azov Ransomware

The Hacker News 13.12.2022 10:08
Cybersecurity researchers have published the inner workings of a new wiper called Azov Ransomware that’s deliberately designed to corrupt data and "inflict impeccable damage" to compromised systems.
Distributed through another malware loader known as SmokeLoader, the malware has been described as an "effective, fast, and unfortunately unrecoverable data wiper," by Israeli cybersecurity company

New Ransom Payment Schemes Target Executives, Telemedicine

Krebs Security 08.12.2022 19:25
Ransomware groups are constantly devising new methods for infecting victims and convincing them to pay up, but a couple of strategies tested recently seem especially devious. The first centers on targeting healthcare organizations that offer consultations over the Internet and sending them booby-trapped medical records for the "patient." The other involves carefully editing email inboxes of public company executives to make it appear that some were involved in insider trading.

Legen wir heute los

Aufschieben ist manchmal eine Lösung. Lassen Sie uns eine bessere finden. Wir stellen Ihnen gerne unseren Ansatz für Ihre Herausforderungen vor – selbstverständlich kostenfrei. 

Lassen Sie uns jetzt über Ihr Anliegen sprechen