Marco Eggerling from Check Point says that AI should be taught a kind of ethics catalogue right from the start so that it adheres to certain rules on its own.

Marco Eggerling from Check Point says that AI should be taught a kind of ethics catalogue right from the start so that it adheres to certain rules on its own.
As the ransomware threat intensifies, ransomware protection must react. What do storage and security experts recommend?
Countering 2FA circumvention attempts requires strengthening it with additional measures, says guest author Sébastien Viou of Stormshield.
Cybercrime is fast becoming a professional services-based industry, according to the WithSecure report.
The role and responsibilities of CISOs are changing, but is the direction right? We asked Tyler Baker of Bitdefender.
The modalities and targets of cyberattackers has changed, warns guest author Lance Spitzner of the SANS Institute.
Study: 86 % of German IT and cybersecurity managers have problems with their backup and recovery solutions.
What does the collapse of Silicon Valley Bank mean for cybersecurity? A commentary by Arctic Wolf's Ian McShane.
eco IT Security Survey 2023: IT experts see an intensification of the cyber threat situation due to the war in Ukraine.
Employee Security Index (ESI) Benchmark shows it takes an average of three months of training for employees to develop an adequate understanding of cybersecurity.
Not only companies complain about ransomware attacks, cyber insurers fear further cost increases.
APT Activity Report T3 2022 from ESET shows: Groups allied with China have shifted their activities to European countries.
They attack their victims with more than 50 ransomware families. The cybercriminals often gain access to networks via phishing. Ransomware-as-a-service contributes to the success of the cyber extortion business model.
Chat GPT advises, "Contingency plans should be prepared and employees should be trained to properly respond to an attack."
Brand misuse for phishing attacks: Yahoo tops the list, ahead of DHL, Microsoft and Google.
Around 35,000 accounts are affected. Unknown persons capture names, addresses and social security numbers, but no financial data. The trigger is a credential stuffing attack.
After a network intrusion, it usually takes cybercriminals eleven days to capture or encrypt data, warns Wolfgang Kurz of indevis.
Cyber-Deception is one of the most effective and powerful approaches the computer security industry has perhaps ever seen.
Mandiant forecast assumes cyber operations due to energy crisis and Russian war of aggression.
Imperva study shows: Automated threats jeopardize Black Friday and holiday shopping.
Trend Micro: Ransomware attacks on Linux and embedded systems in double digits.
Business decision-makers are unable to assess their digital attack surfaces due to complexity.
The education sector suffers from the highest data encryption rate and the longest recovery time worldwide.
Homograph phishing attacks use similar characters to impersonate another website.