BSI establishes global standard for security, availability and sustainability Data centre boom calls for new trust mechanisms The global expansion of data centres is accelerating rapidly. Artificial intelligence, cloud computing and data-intensive applications are...
Fake dating app serves as spying tool
Current campaign shows how effective social manipulation is Online dating is a popular hunting ground for cybercriminals. Security researchers at ESET have now uncovered a digital romance scam in Pakistan that is completely new in this form. Hackers use a manipulated...
Data Privacy Day 2026: Data protection through AI more relevant than ever
Chris Harris, EMEA Technical Director, Data and Application Security at Thales Most data breaches today are not caused by hackers. They take place quietly within IT systems. Although the findings of the Thales Data Threat Report show that the number of reported data...
The biggest cyber attacks of 2025 and the lessons learned
2025 was a record-breaking year for cyber attacks. From Salesforce leaks to state espionage, 8com highlights the biggest threats and lessons learned in its comprehensive review of the year. The year 2025 marks a turning point in the history of digital security. While...
Flipping the switch: 2026 will see a shift from reaction to prevention
Author: Martin Zugec, Technical Solutions Director, Bitdefender New technologies, new pace: cybercriminals' skills are developing faster than ever. In 2026, companies will therefore undergo a fundamental change: away from reactive defence and towards proactive and...
Data security and cyber resilience put to the test
Author: Greg Hansbuer, Pink Elephant Controversial issues surrounding data sovereignty, cyber security, compliance and resilient data infrastructure will be even more pressing for companies in 2026 Geopolitical tensions and the dominance of international tech...
Massive data leak at Condé Nast: 2.3 million WIRED records published
A hacker has published 2.3 million records containing sensitive information about WIRED subscribers after the publisher Condé Nast ignored his warnings. Further publications involving a total of 40 million records are imminent. As the year draws to a close, the...
Five key IT trends for 2026
Assessment by the Association for the Promotion of IT from Europe (ITE) Global supply bottlenecks, new European regulations and growing demands for digital sovereignty will force companies to make strategic decisions in 2026. According to the Association for the...
QR code phishing: A rapidly growing form of attack in email traffic
QR code-based phishing has become one of the fastest-growing threats in email security in 2025. According to recent analyses by Kaspersky, the number of malicious QR codes in emails increased massively in the second half of 2025. Between August and November, 46,969 to...
Cybersecurity 2026: AI, identity, digital sovereignty and new compliance obligations shape the security year
CThe year 2026 will be a turning point for the cybersecurity industry – technologically, politically and regulatorily. Leading experts from Europe paint a clear picture: artificial intelligence will profoundly change the threat landscape, identities will become a...


