Nieuws

Researchers from Zenity have found multiple ways to inject rogue prompts into agents from mainstream vendors to extract ...
Blockchain is emerging as a powerful tool for CISOs to close trust gaps in identity, audit and supply chain security.
Stehen Budgetkürzungen an, müssen Sicherheitsentscheider schwierige Entscheidungen fällen – und dabei sicherstellen, dass das ...
Google has admitted it was among the victims of the Salesforce-related data theft campaign first uncovered by its own threat ...
Open-source credential management systems HashiCorp Vault and CyberArk Conjur had flaws enabled remote code execution among ...
AI dominated the conversation at Black Hat 2025, from the rise of autonomous agents and shadow AI to surging identity-based ...
Naor Haziz’s discovery shows how a compromised container on EC2-backed ECS tasks can impersonate the ECS agent and steal IAM ...
Administrators with hybrid Exchange Server environments are urged by Microsoft and the US Cybersecurity and Infrastructure ...
A crafted inference request in Triton’s Python backend can trigger a cascading attack, giving remote attackers control over ...
AI models, agentic frameworks, data pipelines, and all the tools, services, and open-source libraries that make AI possible ...
With identity becoming a top way attackers gain access to corporate networks, security admins must take control of Windows ...
Auf der Sicherheitskonferenz Black Hat USA drehte sich 2025 wenig überraschend fast alles um KI – auch mit Blick auf neue ...