With the promulgation of the Act implementing the NIS 2 Directive, a comprehensive modernisation of German cybersecurity law will come into force tomorrow. The new law regulates key aspects of information security management in the federal administration and at the...
Hackers disguise malware as cult game ‘Snake’
Hackers disguise their malicious code as the game “Snake” (Image: ESET) Iranian hacker group ‘MuddyWater’ attacks critical infrastructure in Israel and Egypt Researchers at European IT security manufacturer ESET have uncovered a particularly malicious campaign by the...
Datadog 2025 Study: Companies Increasingly Rely on Data Perimeters in the Cloud
The latest edition of Datadog’s State of Cloud Security report shows that organizations are increasingly adopting advanced security strategies to better protect their cloud infrastructures. Key trends include the use of data perimeters and centrally managed...
European Digital Sovereignty Summit 2025: ‘From debate to delivery’
According to Martin Hager, founder and CEO of communications service provider Retarus, the European Digital Sovereignty Summit 2025 in Berlin has set a central and long-overdue focus: strengthening European digital independence. It is now crucial that political...
InfoGuard AG: DevOps at its limits: How DevSecOps protects against cyber risks
The definition provided by NIST states that DevSecOps helps to ensure that security is considered as part of all DevOps practices by integrating security practices and automatically generating security and compliance artefacts across processes and environments. A much...
Black Friday 2025: Payment Fraud Escalates in Speed and Complexity
As consumers gear up for the busiest shopping season of the year, payment fraud is escalating both in speed and sophistication. Recent data from central banks, combined with Signicat’s latest study on identity fraud, indicate that while Strong Customer Authentication...
WLAN: Surveillance trap in wireless networks
KIT researchers warn: New technology recognises people without their own devices based on signals Researchers at the Karlsruhe Institute of Technology (KIT) can recognise people based solely on WLAN signals. They point out that this poses a significant risk to...
Forescout cybersecurity predictions for 2026
Rik Ferguson, VP of Security Intelligence at Forescout Technologies Daniel dos Santos, Head of Research at Forescout Vedere Labs Kristian von Mejer, Director Central & Eastern Europe at Forescout Technologies – Predictions for the DACH market 1. Attackers will...
Cybersecurity: Bundestag passes NIS2 implementation
Federal administration must meet the same standards as companies Short-term new regulation on the possible ban on critical components may slow down investment With today's passing of the law implementing the EU NIS-2 Directive by the Bundestag, the digital association...
United Kingdom: £10.9 billion stolen from British consumers in the last 12 months
Fraudsters have stolen an estimated £10.9 billion from British consumers over the past twelve months, according to the latest State of Scams in the UK report published by the Global Anti-Scam Alliance in collaboration with the British fraud prevention service Cifas...


