Author: wordpress

Why Threat Intelligence is Crucial for Modern Cyber Defense

As cyberattacks become more sophisticated and frequent, organizations face unprecedented risks to their digital assets, reputations, and operational continuity. Cybercrime costs are rising rapidly, underscoring the urgent need for proactive defense mechanisms. Threat intelligence has emerged as a critical tool…

Malicious Macros Return in Sophisticated Phishing Campaigns

The cybersecurity landscape of 2025 is witnessing a troubling resurgence of malicious macros in phishing campaigns. Despite years of advancements in security measures and Microsoft’s decision to disable macros by default in Office applications, attackers have adapted their methods to…

Cato Networks unveils GenAI security controls for Cato CASB

Cato Networks introduced GenAI security controls for Cato CASB (Cloud Access Security Broker). Cato CASB, a native feature in the Cato SASE Cloud Platform, is now enhanced with new capabilities for GenAI applications including a shadow AI dashboard and policy engine. With…

Intelligente Rollenverteilung: KI und LLM im Einsatz für IAM

Die Rollen- und Rechtevergabe in Unternehmen erfolgt häufig noch nach veralteten Prinzipien, da Identity und Access Management als zu komplex empfunden werden. KI und Large Language Models können IAM-Prozesse auf sichere Weise vereinfachen. Dieser Artikel wurde indexiert von Newsfeed Lesen…

NEC Identity Cloud Service simplifies identity verification

NEC introduces Identity Cloud Service (ICS), a new identity verification solution to deliver streamlined, secure and cost-effective access management. Based on NEC’s biometric technology, ICS provides verification and search capabilities for corporations and global enterprises, financial services, hospitality, e-commerce, government…

Hackers Exploit Node.js to Spread Malware and Exfiltrate Data

Threat actors are increasingly targeting Node.js—a staple tool for modern web developers—to launch sophisticated malware campaigns aimed at data theft and system compromise. Microsoft Defender Experts (DEX) have reported a spike in such attacks since October 2024, especially focusing on…