Infostealer 2026: How Stolen Session Cookies Bypass MFA
RedLine, Lumma, Raccoon: Infostealer malware steals session cookies and bypasses MFA. What truly works in 2026. Read article
RedLine, Lumma, Raccoon: Infostealer malware steals session cookies and bypasses MFA. What truly works in 2026. Read article
AI weapons in action: How deepfakes and AI-powered attacks are revolutionizing cybersecurity. Who controls this threat? Read article
Anthropic has built an AI model that finds vulnerabilities faster than most security teams. Claude Mythos discovered a 27-year-old bug in OpenBSD and several privilege escalation paths in the Linux kernel. The situation assessment. Read article
Gmail rejects emails without DMARC. How to set up SPF, DKIM, and DMARC correctly in 5 days. Read article
NIST has finalized three post-quantum standards. BSI deadline 2030/2032. Why PQC migration must start now. Read article
7 min read Every request to a cloud AI service constitutes a data transfer to a third party. With open-source models like Google’s Gemma 4, AI can now be operated... Read article
8 min Reading Time The global threat intelligence market will grow to $8.2 billion by 2026. By 2034, it will exceed $31 billion. But threat intelligence is not just a... Read article
9 min Reading Time Over 40 percent of companies filing a cyber claim receive no payout. 72 percent of small and medium-sized enterprises are completely uninsured. And after two years... Read article
6 min Reading Time A DDoS attack on Deutsche Bahn. An arson attack on Berlin’s power grid. Russian state hackers infiltrating the Signal contacts of a former BND (Federal Intelligence... Read article
6 min Reading Time 502 cryptographers are warning, Signal threatens to exit the EU market, Germany’s Federal Constitutional Court has ruled parts of source telecommunications surveillance unconstitutional – and the... Read article
6 min reading time 502 cryptographers warned that Signal threatened to exit the European market – and Germany’s Federal Constitutional Court struck down parts of “on-device” communications interception. Yet the... Read article
8 min Reading Time Microsoft 365 Copilot has a zero-click vulnerability with a CVSS score of 9.3. The European Data Protection Supervisor (EDPS) has reprimanded the EU Commission for its... Read article
5 min Reading Time 79 percent of Business Email Compromise (BEC) victims had MFA correctly implemented – and were hacked anyway. The reason: Standard MFA is a one-time hurdle, worthless... Read article
3 min Reading Time Microsoft’s March 2026 Patch Tuesday resolves 84 vulnerabilities, including 3 critical ones and 2 zero-days. But the real headline lies in CVE-2026-21536: a critical remote code... Read article
3 min Reading Time 75 percent of all security incidents in 2026 stem from stolen identities, not technical exploits. A 50 percent increase in compromised credentials in the second half... Read article
8 min Reading Time The Deutsche Telekom’s Master SOC in Bonn processes 95 million attack attempts per day. 250 cybersecurity experts work around the clock, networked with centers in 13... Read article
8 min reading time Deutsche Telekom’s Master SOC in Bonn processes 95 million cyberattack attempts daily. 250 cybersecurity experts work around the clock, connected with centers across 13 countries. The... Read article
12 min Reading Time Your developers have just rolled out the latest API update, the product owner is celebrating the launch – and no one checked whether the new endpoint... Read article
⏱ 14 min Reading Time DORA has been applicable since January 2025, NIS2 transposed into German law since December 2025. For financial service providers, this means: two regulations with different... Read article
⏱ 12 min Reading Time With the Bundesrat’s approval on March 6, 2026, the KRITIS Umbrella Act has officially come into force. For approximately 2,000 operators of critical infrastructures in... Read article
7 min Reading Time A compromised printer in accounting. Sounds harmless – until the attacker jumps from it to the domain controller via the flat network, then to production control,... Read article