Cyber Security
Flipping the switch: 2026 will see a shift from reaction to prevention

Flipping the switch: 2026 will see a shift from reaction to prevention

Author: Martin Zugec, Technical Solutions Director, Bitdefender New technologies, new pace: cybercriminals' skills are developing faster than ever. In 2026, companies will therefore undergo a fundamental change: away from reactive defence and towards proactive and...

Data security and cyber resilience put to the test

Author:  Greg Hansbuer, Pink Elephant Controversial issues surrounding data sovereignty, cyber security, compliance and resilient data infrastructure will be even more pressing for companies in 2026 Geopolitical tensions and the dominance of international tech...

Massive data leak at Condé Nast: 2.3 million WIRED records published

A hacker has published 2.3 million records containing sensitive information about WIRED subscribers after the publisher Condé Nast ignored his warnings. Further publications involving a total of 40 million records are imminent. As the year draws to a close, the...

Five key IT trends for 2026

Assessment by the Association for the Promotion of IT from Europe (ITE) Global supply bottlenecks, new European regulations and growing demands for digital sovereignty will force companies to make strategic decisions in 2026. According to the Association for the...

QR code phishing: A rapidly growing form of attack in email traffic

QR code-based phishing has become one of the fastest-growing threats in email security in 2025. According to recent analyses by Kaspersky, the number of malicious QR codes in emails increased massively in the second half of 2025. Between August and November, 46,969 to...

2026: The Year of the Fraudster

A commentary by Frank Heisel, CEO of RISK IDENT While the Chinese lunar calendar proclaims 2026 to be the ‘Year of the Goat,’ promising attributes such as justice and good nature, security experts paint a very different picture. The current forecast from RISK IDENT is...

Cybersecurity law: NIS 2 Implementation Act comes into force tomorrow

With the promulgation of the Act implementing the NIS 2 Directive, a comprehensive modernisation of German cybersecurity law will come into force tomorrow. The new law regulates key aspects of information security management in the federal administration and at the...

Hackers disguise malware as cult game ‘Snake’

Hackers disguise malware as cult game ‘Snake’

Hackers disguise their malicious code as the game “Snake” (Image: ESET) Iranian hacker group ‘MuddyWater’ attacks critical infrastructure in Israel and Egypt Researchers at European IT security manufacturer ESET have uncovered a particularly malicious campaign by the...

Security Essen 2022