With the end of support for Ingress NGINX, many companies are facing a security-critical turning point. Since March 2026, there have been no updates or patches for the widely used Ingress controller – a situation recently highlighted by a critical vulnerability...
Operation Alice: Global cybercrime crackdown paralyses dark web infrastructure on an industrial scale
One of the largest international cybercrime operations to date, carried out in March 2026, has impressively demonstrated the scale that digital crime on the dark web has now reached – and how effectively coordinated law enforcement can tackle it. Led by German...
Many companies overestimate their ability to recover from a cyberattack
A study highlights risks in corporate backup and recovery strategies. Cyberattacks are increasingly targeting not only production IT systems, but also specifically backup and recovery infrastructures. A recent investigation by DATA REVERSE® Data Recovery shows that...
When data is inaccessible despite backups: Why data recovery will become increasingly important in 2026
Technical verifiability is becoming increasingly important for companies in the event of damage Access to company data is still taken for granted in many places—especially when effective backup concepts are in place. However, the technical reality of modern storage...
Hackers use Google AI to take over smartphones
ESET discovers first Android malware to use generative AI Cybercriminals have crossed a technological threshold: for the first time, Android malware is using generative AI on the fly to embed itself in infected devices and take control of them. Researchers at European...
GData:Cybersecurity measures and guidelines:
Majority of company employees cope well in their everyday work IT security is fully effective when it is also supported by the workforce For effective IT security, it is important that company employees are able to work well with the measures and guidelines that have...
Why cyber security is essential today – Salto Systems and secure smart access in the European context
The increasing digitalisation of physical access systems is fundamentally changing the security architecture of companies, public institutions and critical infrastructures. Access control is no longer organised exclusively on a mechanical or local basis, but is now...
Trust seal for data centres in the Middle East
BSI establishes global standard for security, availability and sustainability Data centre boom calls for new trust mechanisms The global expansion of data centres is accelerating rapidly. Artificial intelligence, cloud computing and data-intensive applications are...
Fake dating app serves as spying tool
Current campaign shows how effective social manipulation is Online dating is a popular hunting ground for cybercriminals. Security researchers at ESET have now uncovered a digital romance scam in Pakistan that is completely new in this form. Hackers use a manipulated...
Data Privacy Day 2026: Data protection through AI more relevant than ever
Chris Harris, EMEA Technical Director, Data and Application Security at Thales Most data breaches today are not caused by hackers. They take place quietly within IT systems. Although the findings of the Thales Data Threat Report show that the number of reported data...

