Blog

Filter Blog Posts
Tips and tricks for safe handling in the IT environment

EDR/MDR

12.05.2022

Tips and tricks for safe handling in the IT environment

Helpful tips and tricks for secure handling in the IT environment. So that you and your data are optimally protected at all times.

Read More

What actually is ransomware?

CLARIFICATION

12.05.2022

What actually is ransomware?

An overview of the topic of ransomware. Extortion methods since 1980.

Read More

Security vulnerability: Microsoft Windows Server "Zerologon" (CVE-2020-1472)

NEWS

12.05.2022

Security vulnerability: Microsoft Windows Server "Zerologon" (CVE-2020-1472)

"Zerologon" enables attackers to exploit the cryptographic algorithm used in the Netlogon authentication process.

Read More

What impact does coronavirus have on IT security?

NEWS

12.05.2022

What impact does coronavirus have on IT security?

Trends and forecasts for IT security based on an exhibitor survey at it-sa.

Read More

The Online Access Act - challenges

NEWS

12.05.2022

The Online Access Act - challenges

Part 2: For digital administration, every piece of the puzzle must fit together perfectly. This is precisely what presents German administrations with considerable challenges.

Read More

SolarWinds Backdoor "Sunburst"

INCIDENT RESPONSE MANAGEMENT

12.05.2022

SolarWinds Backdoor "Sunburst"

Attackers have gained access to public and private organisations around the world and landed what is probably the biggest cyberattack of 2020.

Read More

Zerologon

CLARIFICATION

12.05.2022

Zerologon

The uproar surrounding the CVE-2020-1472 vulnerability continues.

Read More

Hacking group publishes passwords of Fortinet customers online

NEWS

12.05.2022

Hacking group publishes passwords of Fortinet customers online

Since last night, passwords have appeared on the RAMP hacking forum that appear to be from a cyber-incident at Fortinet in the spring.

Read More

3 ways you can be hacked in the real world

12.05.2022

3 ways you can be hacked in the real world

There are many ways in which attackers can steal your data. We present 3 frequently used possibilities.

Read More

The Online Access Act

NEWS

12.05.2022

The Online Access Act

Part 1: All administrative services for citizens are to be offered digitally by 2022.

Read More

Presentation: MDR - Managed Detection and Response

SOC

12.05.2022

Presentation: MDR - Managed Detection and Response

What is an MDR and how does it work?

Read More

Corona pandemic causes cybercrime to rise rapidly

12.05.2022

Corona pandemic causes cybercrime to rise rapidly

In the shadow of the coronavirus pandemic, experts are recording a massive increase in cyber attacks worldwide. Find out which threats are currently particularly relevant, how you can protect your company effectively and what is now important when working from home.

Read More