Android scam promises access to call logs for any phone number Apps that promise to display the call history of other people’s phone numbers are currently luring millions of users into a cost trap. Security experts at the European IT security firm ESET are warning of...
Check Point integrates its AI Defense Platform into Google Cloud
Securing AI agents through integrated detection, governance and runtime protection Check Point® Software Technologies Ltd., a pioneer and global leader in cybersecurity solutions, is integrating its AI Defense Platform into Google Cloud’s Gemini Enterprise Agent...
Editorial 3-2026: Between Protection and Impact – Where is Physical Security Heading?
XPONENTIAL Europe 2026 in Düsseldorf presented itself as a showcase for autonomy, resilience and connected security. Yet, despite all the technological fascination, a trend emerged that the industry can no longer ignore: physical security, civil infrastructure...
Cybersecurity boom in Saudi Arabia: Market set to grow to US$7.8 billion
Digitalisation, cloud computing and managed services are driving demand in the Kingdom The cybersecurity market in Saudi Arabia is poised for a dynamic surge in growth. According to a recent analysis by market research firm MarketsandMarkets, the market volume is set...
Airlock Microgateway 5.0: Kubernetes security following the end of support for Ingress NGINX
With the end of support for Ingress NGINX, many companies are facing a security-critical turning point. Since March 2026, there have been no updates or patches for the widely used Ingress controller – a situation recently highlighted by a critical vulnerability...
Operation Alice: Global cybercrime crackdown paralyses dark web infrastructure on an industrial scale
One of the largest international cybercrime operations to date, carried out in March 2026, has impressively demonstrated the scale that digital crime on the dark web has now reached – and how effectively coordinated law enforcement can tackle it. Led by German...
Many companies overestimate their ability to recover from a cyberattack
A study highlights risks in corporate backup and recovery strategies. Cyberattacks are increasingly targeting not only production IT systems, but also specifically backup and recovery infrastructures. A recent investigation by DATA REVERSE® Data Recovery shows that...
When data is inaccessible despite backups: Why data recovery will become increasingly important in 2026
Technical verifiability is becoming increasingly important for companies in the event of damage Access to company data is still taken for granted in many places—especially when effective backup concepts are in place. However, the technical reality of modern storage...
Hackers use Google AI to take over smartphones
ESET discovers first Android malware to use generative AI Cybercriminals have crossed a technological threshold: for the first time, Android malware is using generative AI on the fly to embed itself in infected devices and take control of them. Researchers at European...
GData:Cybersecurity measures and guidelines:
Majority of company employees cope well in their everyday work IT security is fully effective when it is also supported by the workforce For effective IT security, it is important that company employees are able to work well with the measures and guidelines that have...

