Cyber Security Blog

Dive with us into the world of hackers, data espionage, and attack defense - several times a week for free!

Artificial Intelligence - one of the buzzwords in IT in recent years. In which direction is artificial intelligence actually developing? Do AI investments make sense at this point in time or have companies that do not yet use AI applications already missed the boat? Does AI possibly even pose risks for IT security or is artificial intelligence - on the contrary - even an enrichment for security?

The Bizarro banking Trojan is a malware that uses sophisticated social engineering to steal online banking access data. Bizarro is not the only banking Trojan whose spread is increasing sharply in the first half of 2021. The malware is flanked by Flubot - another malware that targets smartphones and tablets. We will show you the ways in which the current banking Trojans want to access your data and give you tips on how to protect yourself from the cyberthreats.

The IT industry is part of a fast-moving professional sector - thousands of jobs have therefore opened up for IT graduates in recent years. Employers continue to search desperately for qualified IT staff. However, according to a study by staffing firm Robert Half, 90 percent of recruiters find it difficult to find suitable employees. Who are employers looking for most urgently? Which field or specialization offers the best job opportunities? In this article, we look at eight of the most sought-after IT jobs.

A new "service" is currently enjoying criminal success on the Darknet and posing a new challenge to the IT security of companies worldwide. Ransomware-as-a-Service (RaaS) is the name of the new trend - and can turn any petty criminal into a cyber extortionist in no time. This article explains what exactly Ransomware-as-a-Service is and what this form of cyber attack means for IT security.

A large number of different software platforms are used within companies. Especially for certain functions outside the central systems, companies like to use open source software (OSS). However, the use of such software does not only have advantages. Open source software can also become an IT security risk. When there is a risk of cyber attacks due to the use of open source software is only one aspect that is highlighted in this blog post.

Blackmailing ransomware, highly professional Advanced Persistent Threats or data espionage through social engineering: the more and the more elaborate an IT security challenge, the greater the media interest. Yet neither ransomware nor APTs are among the most frequently used attack strategies of hackers. Rather, the criminals exploit a widespread characteristic of us humans for the most popular form of cyber attack.

The use of artificial intelligence (AI) is also playing an increasingly important role in cyber security. Artificial intelligence shows its strengths above all in the early detection of cyber threats or in the real-time monitoring of IT infrastructures. However, uncontrolled use of AI is definitely dangerous! In this article, you will learn what artificial intelligence can do in the area of cyber security and how AI can support cyber threat hunting and threat intelligence.

With the passed IT Security Act 2.0 (IT-SIG), anomaly detection for CRITIS companies and organisations is enshrined in law. Now it is time for operators of critical infrastructures to act: According to IT-SIG 2.0, they must implement appropriate protective measures to defend against cyber attacks within one year that comply with the current legislation. How can it be done faster?

The Luca app has been available since March 2021. This app makes it possible to trace contacts in the event of infection with COVID-19 by registering whereabouts. The federal government favored a digital system, allowing a seamless transfer of information without time delay. Now the group LucaTrack has discovered and made public a serious security vulnerability in the app. What does this mean for users of the app?