Fake QR codes pose a growing threat to email security - BSI speaks of quishing.

Fake QR codes pose a growing threat to email security - BSI speaks of quishing.
Chat GPT advises, "Contingency plans should be prepared and employees should be trained to properly respond to an attack."
Hackers apparently succeed in decrypting parts of the compromised backups. These also contained passwords of customers, which are, however, protected by salt and hash.
Around 35,000 accounts are affected. Unknown persons capture names, addresses and social security numbers, but no financial data. The trigger is a credential stuffing attack.
VicOne and TrendMicro join Panasonic and Hitachi Astemo to showcase new security solutions for connected vehicles.
In addition to security, IT solutions must also be able to demonstrate sustainability. Analyst Simon Mingay, Research Vice President, Gartner Research, explains why.
The proportion of employees with low or very low competence in IT security is rising significantly. Only 27 percent consider themselves to have a high or very high level of competence.
Free tool for vulnerability and risk detection of data exfiltrations via DNS.
However, a small part of the currently offered data originates from an earlier security incident. Twitter assumes that the leak was compiled from sources already publicly available.
Malwarebytes has discovered a skimmer that uses the "Mr.SNIFFA" framework and targets e-commerce websites and their customers.
Serious security vulnerabilities in the medical sector. Hospitals are increasingly falling victim to cyberattacks.
The safes also contain non-encrypted data. However, these are in a proprietary format. LastPass emphasizes that all passwords are secured by 256-bit AES encryption.
After a network intrusion, it usually takes cybercriminals eleven days to capture or encrypt data, warns Wolfgang Kurz of indevis.
Munich Quantum Network at the University of the Federal Armed Forces Munich achieves milestone with newly developed key management system.
The Hasso Plattner Institute (HPI) has been warning about the risks of weak passwords for years, and every year it produces a ranking of the most commonly used passwords.
The December patchday also brings a fix for a zero-day vulnerability. In total, Microsoft eliminates 56 vulnerabilities. Windows, Edge, Office, SharePoint, Azure and Hyper-V are among those affected.
Hybrid work models will become the gateway for criminals to enter corporate networks.
2023 is a good year to start a cybercrime career. Internet marketplaces offer stolen credentials and ready-made ransomware.
Cyber-Deception is one of the most effective and powerful approaches the computer security industry has perhaps ever seen.
In the future, Apple will also offer end-to-end encryption for backups and photos. In addition, the Apple ID will support hardware security keys starting next year.
Mandiant forecast assumes cyber operations due to energy crisis and Russian war of aggression.
Umfrage zeigt, wie unterschiedlich Endnutzer und IT-Entscheider in puncto Datensicherheit ticken – und was daraus für die IT-Security folgt.
How are the current crises affecting the cloud and its security? An interview with Soeren von Varchmin, Chairman of the Advisory Board CloudFest.
The cyber extortionists exploit a known vulnerability in a Windows graphics driver. They then manipulate drivers of anti-virus software. This way, the BlackByte group can access systems of its victims undisturbed.
They are part of a large-scale malvertising campaign. 75 apps find their way into the Play Store. 10 more apps make it into the Play Store.
The hacker gained access to vulnerability reports and shared screenshots of internal systems, the email dashboard, and Slack server.
Recent study by Mimecast highlights level of security threats in healthcare.
A security function blocks third-party printer cartridges. HP is retrofitting the function to some printers via a firmware update. So far, only customers in Belgium, Italy, Spain and Portugal are receiving compensation.
In his guest article, Yaroslav Rosomakho from Netskope explains how cybercriminals work and how companies can arm themselves against them.
Windows computers that support the VAES instruction set are affected. An update temporarily reduces the performance of AES-based operations significantly.