Doorzoek en filter alle geregistreerde cyberdreigingen voor gemeenten.
125 dreigingen gevonden · pagina 2 van 11
Modern attack surfaces don’t sit still. Cloud expansion, SaaS sprawl, identity complexity, and shadow IT are continuously reshaping organizational risk. For security leaders, visibility isn’t the challenge anymore, but actually operationalizing that visibility is. Surface Command was built to unify asset and identity intelligence across your external attack surface. But translating that intelligence into executive-ready dashboards or operational reporting has often required knowledge of Cypher queries. Today, that changes: We’re introducing filter-based dashboard widgets in Surface Command, en
New Industry Data Just Released Suggests Not. On May 19th, 2026, Orchid Security released the results of our Identity Gap: Snapshot 2026. Among the findings, "identity dark matter" (the unseen, unmanaged elements of identity) now overshadows the visible elements 57% vs. 43%. And it couldn't have occurred at a worse time, with enterprises embracing Agent AI with both arms (and unfortunately, as
GitHub on Tuesday said it's investigating unauthorized access to its internal repositories after the notorious threat actor known as TeamPCP listed the platform's source code and internal organizations for sale on a cybercrime forum. "While we currently have no evidence of impact to customer information stored outside of GitHub's internal repositories (such as our customers' enterprises,
Het populaire communicatieplatform Discord maakt voortaan voor alle spraak- en videogesprekken standaard gebruik van end-to-end ...
PinTheft, a recently patched Linux privilege escalation vulnerability, now has a publicly available proof-of-concept (PoC) exploit that allows local attackers to gain root privileges on Arch Linux systems. [...]
Juridische vraag: Een leerling op de school van mijn zoon heeft de centrale printer van hun school gehackt. Volgens hen was het ...
AI-generated lookalike domains are now embedded inside the third-party scripts running on your web properties. Here's why your current stack can't see them, and what detection actually requires. Download the CISO Expert Guide to Typosquatting in the AI Era → TL;DR Typosquatting is no longer a user problem. Attackers now embed lookalike domains inside legitimate third-party scripts.
De ontwikkelaars van het populaire contentmanagementsysteem (CMS) Drupal komen vanavond met beveiligingsupdates voor zeer ...
De systemen van huisartsen moeten worden voorzien van een knop om brede gegevensuitwisseling met de buitenwereld te blokkeren, ...
Unit 42 analyzes TamperedChef malware clusters that use trojanized productivity apps and malvertising to deliver stealthy payloads to targets. The post Tracking TamperedChef Clusters via Certificate and Code Reuse appeared first on Unit 42 .
Er komt toch een alternatief voor het luchtalarm dat vanaf 2028 wordt uitgefaseerd, zo zegt minister Van Weel van Justitie en ...
Gebruikers van de in Firefox ingebouwde gratis vpn-dienst kunnen voortaan ook de locatie van de vpn-server kiezen, zo heeft ...