Author: wordpress

Gesundheitswesen: Sicherheitsstandards im Wandel

Die Bedrohungslage im Gesundheitswesen hat sich stark verändert. Cyberangriffe und physische Attacken bedrohen diesen Bereich verstärkt. Gesetzgebungen wie NIS2 und KRITIS erfordern künftig integrierte Sicherheitskonzepte für ganzheitlichen Schutz. Dieser Artikel wurde indexiert von Newsfeed Lesen Sie den originalen Artikel: Gesundheitswesen:…

Victoria’s Secret, Adidas Hit By Cyber-Attacks

Victoria’s Secret pauses US online orders as Adidas says customer contact information stolen in latest high-profile hacking incidents This article has been indexed from Silicon UK Read the original article: Victoria’s Secret, Adidas Hit By Cyber-Attacks

MITRE Releases Roadmap for Transition to Post-Quantum Cryptography

The nonprofit research organization MITRE has unveiled a comprehensive roadmap designed to guide organizations through the critical transition from current cryptographic standards to quantum-resistant algorithms. This strategic framework addresses the emerging threat posed by quantum computing capabilities to existing public-key…

New Linux Security Bugs Could Expose Password Hashes Across Millions of Devices

The Qualys Threat Research Unit (TRU) has disclosed two significant local information disclosure vulnerabilities—CVE-2025-5054 and CVE-2025-4598—impacting the core-dump handlers Apport and systemd-coredump on millions of Linux systems. These race-condition vulnerabilities could enable local attackers to extract highly sensitive data, including…

Blockchain for Cybersecurity Real-World Applications and Limits

As cybercrime costs the global economy an estimated $445 billion annually, blockchain technology is emerging as a powerful cybersecurity weapon and a new battleground for digital threats. With illicit cryptocurrency addresses receiving approximately $40.9 billion in 2024, the blockchain security…

Conducting Risk Assessments That Drive Business Value

Companies across industries are discovering that well-executed risk assessments do far more than check regulatory boxes—they’re becoming powerful engines for business growth and competitive advantage. As organizations face an increasingly complex threat landscape in 2025, forward-thinking leaders are transforming risk…

Share your user story

If you’re reading this blog post, you probably don’t need us to tell you how essential, widespread, and important the OpenSSL Library is. While our open source model means that everyone is freely able to use these tools, it also…

[UPDATE] [hoch] Cisco IOS XE Wireless Controller: Mehrere Schwachstellen

Ein Angreifer kann mehrere Schwachstellen in Cisco IOS XE Wireless Controllern ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebige Nutzerkonten zu löschen oder einen Denial of Service zu verursachen. Dieser Artikel wurde indexiert von BSI Warn- und Informationsdienst (WID): Schwachstellen-Informationen…