Skip to content
Menu
Our Services
Penetration Testing
Red Teaming
SOC as a Service
Phishing Simulations
Governance, Risk and Compliance
NIS2 Directive
Whistleblowing
Company
About us
Career
Blog
Contact Us
English
Deutsch
Diesec Site Map
Home
Home
About us
About us
Our Services
Penetration Testing
Red Teaming
Social Engineering
IT Forensics
Data Security
SOC as a Service
Career
Career
Blog
Blog
Top 5 Cybersecurity News Stories February 7, 2025
Top 5 Cybersecurity News Stories January 31, 2025
Top 5 Cybersecurity News Stories January 24, 2025
DIESEC’s Cybersecurity Services In Australia – Let Us Help Keep Your Data Secure
Top 5 Cybersecurity News Stories January 17, 2025
Top 5 Cybersecurity News Stories January 10, 2025
SaaS Applications and Hidden Security Gaps that Companies Often Miss
Top 5 Cybersecurity News Stories January 3, 2025
DIESEC OY – Your New Cybersecurity Partner In The Nordics
This Week’s Top 5 Cybersecurity News Stories December 2024 | 03
SOCaaS Metrics: Evaluating The Effectiveness of Your Service
This Week’s Top 5 Cybersecurity News Stories December 2024 | 02
This Week’s Top 5 Cybersecurity News Stories December 2024 | 01
The Cyber Risks of Online Voting: Breaking Down the Barriers to Trust
This Week’s Top 5 Cybersecurity News Stories November 2024 | 05
5 Ways To Securely Dispose Of Data
This Week’s Top 5 Cybersecurity News Stories November 2024 | 04
This Week’s Top 5 Cybersecurity News Stories November 2024 | 03
This Week’s Top 5 Cybersecurity News Stories November 2024 | 02
This Week’s Top 5 Cybersecurity News Stories November 2024 | 01
This Week’s Top 5 Cybersecurity News Stories October 2024 | 03
This Week’s Top 5 Cybersecurity News Stories October 2024 | 02
5 Ways To Stay Safe On LinkedIn
This Week’s Top 5 Cybersecurity News Stories October 2024 | 01
This Week’s Top 5 Cybersecurity News Stories September 2024 | 04
Comparing In-house SOC Vs SOC-as-a-Service Solutions
This Week’s Top 5 Cybersecurity News Stories September 2024 | 03
5 Easy Ways To Protect Your Data While Traveling For Work
This Week’s Top 5 Cybersecurity News Stories September 2024 | 02
NIS2 Compliance: 6 Best Practices You Need To Know
This Week’s Top 5 Cybersecurity News Stories September 2024 | 01
What Is Whistleblowing and Why Do You Need a Whistleblowing Solution
This Week’s Top 5 Cybersecurity News Stories August 2024 | 05
This Week’s Top 5 Cybersecurity News Stories August 2024 | 04
This Week’s Top 5 Cybersecurity News Stories August 2024 | 03
The 2024 Crowdstrike Update Fail and What it Means for Security
This Week’s Top 5 Cybersecurity News Stories August 2024 | 02
5 Ways You Can Keep Yourself Safe Online
This Week’s Top 5 Cybersecurity News Stories August 2024 | 01
Navigating the Main Compliance Challenges of the NIS 2 Directive
This Week’s Top 5 Cybersecurity News Stories July 2024 | 04
This Week’s Top 5 Cybersecurity News Stories July 2024 | 03
The Rise Of Vulnerability Exploitation And How To Stop It
This Week’s Top 5 Cybersecurity News Stories July 2024 | 02
This Week’s Top 5 Cybersecurity News Stories July 2024 | 01
The Top 5 Cybersecurity Mistakes Made By Companies
This Week’s Top 5 Cybersecurity News Stories June 2024 | 04
Unpacking the Recent Huge Ticketmaster Breach
This Week’s Top 5 Cybersecurity News Stories June 2024 | 03
This Week’s Top 5 Cybersecurity News Stories June 2024 | 02
The Value of External Review of Your GDPR Compliance Practices
This Week’s Top 5 Cybersecurity News Stories June 2024 | 01
This Week’s Top 5 Cybersecurity News Stories May 2024 | 05
This Week’s Top 5 Cybersecurity News Stories May 2024 | 04
5 Easy Ways to Spot a Phishing Email
This Week’s Top 5 Cybersecurity News Stories May 2024 | 03
This Week’s Top 5 Cybersecurity News Stories May 2024 | 02
This Week’s Top 5 Cybersecurity News Stories May 2024 | 01
The Risk of Overconfidence in Cybersecurity Capabilities
This Week’s Top 5 Cybersecurity News Stories April 2024 | 04
This Week’s Top 5 Cybersecurity News Stories April 2024 | 03
This Week’s Top 5 Cybersecurity News Stories April 2024 | 02
How Might The Future of Remote Work Security Look?
This Week’s Top 5 Cybersecurity News Stories April 2024 | 01
This Week’s Top 5 Cybersecurity News Stories March 2024 | 03
The EU’s Digital Operational Resilience Act and Cybersecurity Implications
This Week’s Top 5 Cybersecurity News Stories March 2024 | 02
The Evolution of Ransomware Attacks in 2024
This Week’s Top 5 Cybersecurity News Stories March 2024 | 01
5 Ways to Improve Information Security Awareness
What Are The Benefits of Phishing Simulation Exercises?
Benefits of SOC as a Service
Cybersecurity Awareness Month 2023: 4 Latest Social Engineering Techniques To Watch Out For
5 Sources of Open Source Intelligence in Cyber Security
How Penetration Testing Helps Businesses Comply with Data Privacy Regulations
This Week’s Top 5 News September 2023 | 01
This Week’s Top 5 News August 2023 | 04
Examining the Top 5 Causes of Data Breaches
This Week’s Top 5 News August 2023 | 03
This Week’s Top 5 News August 2023 | 02
Delving Into Cloud Security Challenges and Solutions
This Week’s Top 5 News August 2023 | 01
This Week’s Top 5 News July 2023 | 04
The Security Benefits of Cloud Computing Services
This Week’s Top 5 News July 2023 | 03
This Week’s Top 5 News July 2023 | 02
This Week’s Top 5 News July 2023 | 01
5 Compelling Reasons for Strong Governance in IT Security
This Week’s Top 5 News June 2023 | 05
The Impact of AI on Social Engineering
This Week’s Top 5 News June 2023 | 04
Identifying the Signs of Social Engineering
This Week’s Top 5 News June 2023 | 03
This Week’s Top 5 News June 2023 | 02
This Week’s Top 5 News June 2023 | 01
Insider Cybersecurity Threats: A Hidden Danger
This Week’s Top 5 News May 2023 | 01
AI and Cybersecurity: Examining the Pros and Cons
Royal Ransomware: Threat Analysis
Russian Cyber Tactics: An Overview and Recommended Mitigations
Press Release
The Godfather Banking Trojan
5 automated penetration testing tools
Cyber Security Tips for Your Business
Metasploit: Best Penetration Testing Software
Microsoft Office 365 feature can help Cloud ransomware attacks
Microsoft report on Russian cyber attacks on Ukraine
What is cyber security?
Cybersecurity impact of the Russian-Ukraine conflict
OWASP Top 10 2021: Control Access, Encrypt Everything and Be Afraid of Design Flaws
An Update from Microsoft? No, a sneaky hunter for your money
Pay or Die: New Ransomware Comes to Hit Your Computers. Are You Ready to Fight Back?
Q3 Cyberattacks and Trends: Social Engineering Takes the Upper Hand
TOR Network Under Sophisticated Attack: Perpetrators Covertly Steal Users’ Bitcoins
How to Avoid Being Hacked Like Twitter: Fatal Mistakes You Should Correct Immediately
Updated and more dangerous: FakeSpy comes back to steal money from Android devices
Macbooks under Attack: New Malware Steals, Spies and Extorts Ransom
Contact Us
Contact Us
Impressum
Impressum
Privacy Policy
Privacy Policy