Author: Martin Zugec, Technical Solutions Director, Bitdefender New technologies, new pace: cybercriminals' skills are developing faster than ever. In 2026, companies will therefore undergo a fundamental change: away from reactive defence and towards proactive and...
Data security and cyber resilience put to the test
Author: Greg Hansbuer, Pink Elephant Controversial issues surrounding data sovereignty, cyber security, compliance and resilient data infrastructure will be even more pressing for companies in 2026 Geopolitical tensions and the dominance of international tech...
Massive data leak at Condé Nast: 2.3 million WIRED records published
A hacker has published 2.3 million records containing sensitive information about WIRED subscribers after the publisher Condé Nast ignored his warnings. Further publications involving a total of 40 million records are imminent. As the year draws to a close, the...
Five key IT trends for 2026
Assessment by the Association for the Promotion of IT from Europe (ITE) Global supply bottlenecks, new European regulations and growing demands for digital sovereignty will force companies to make strategic decisions in 2026. According to the Association for the...
QR code phishing: A rapidly growing form of attack in email traffic
QR code-based phishing has become one of the fastest-growing threats in email security in 2025. According to recent analyses by Kaspersky, the number of malicious QR codes in emails increased massively in the second half of 2025. Between August and November, 46,969 to...
Cybersecurity 2026: AI, identity, digital sovereignty and new compliance obligations shape the security year
CThe year 2026 will be a turning point for the cybersecurity industry – technologically, politically and regulatorily. Leading experts from Europe paint a clear picture: artificial intelligence will profoundly change the threat landscape, identities will become a...
2026: The Year of the Fraudster
A commentary by Frank Heisel, CEO of RISK IDENT While the Chinese lunar calendar proclaims 2026 to be the ‘Year of the Goat,’ promising attributes such as justice and good nature, security experts paint a very different picture. The current forecast from RISK IDENT is...
Cybersecurity law: NIS 2 Implementation Act comes into force tomorrow
With the promulgation of the Act implementing the NIS 2 Directive, a comprehensive modernisation of German cybersecurity law will come into force tomorrow. The new law regulates key aspects of information security management in the federal administration and at the...
Hackers disguise malware as cult game ‘Snake’
Hackers disguise their malicious code as the game “Snake” (Image: ESET) Iranian hacker group ‘MuddyWater’ attacks critical infrastructure in Israel and Egypt Researchers at European IT security manufacturer ESET have uncovered a particularly malicious campaign by the...
Datadog 2025 Study: Companies Increasingly Rely on Data Perimeters in the Cloud
The latest edition of Datadog’s State of Cloud Security report shows that organizations are increasingly adopting advanced security strategies to better protect their cloud infrastructures. Key trends include the use of data perimeters and centrally managed...



