Cyber Security Blog

Dive with us into the world of hackers, data espionage, and attack defense - several times a week for free!

On the one hand, the GDPR is intended to ensure the protection of personal data, but on the other hand, it is also intended to ensure the free movement of data within the European single market. Since its introduction in 2018, the GDPR has placed high demands on employers and employees - since then, a data protection breach can be sanctioned with high penalties. In this article, you will learn what you need to pay particular attention to as an employer when it comes to data protection in order to avoid a data breach.

For a long time, industrial controls were isolated local systems. Through further development and integration into the modern IT infrastructure, this industrial sector is now connected to networks and the Internet. Suddenly, critical ICS vulnerabilities are emerging that threaten industry and CRITIS. There is therefore an acute need to catch up in the area of industrial security - this is the conclusion of a recent study by Claroty.

An unusual incident provides insights into the business of the ransomware developers of this malware. An apparently dissatisfied user of a Ransomware as a Service model published operating instructions and scripts of this platform. The information from the Conti Leak allows a look behind the scenes of a modern ransomware and how hackers copy as well as monetise the concept of cloud services.

IP cameras, digital video recorders or baby monitors definitely make our everyday lives more comfortable. IoT devices of all kinds are now used in millions of households and businesses around the world - and are now under attack! This is because a recently discovered IoT security vulnerability allows cyber attacks on the networked devices, where attackers can take control of the networked smart devices via the internet. The vulnerability, named CVE-2021-28372, is classified with a threat level of "critical".

The expectation of being able to exclude certain types of security incidents by choosing a certain endpoint security solution does not fit the reality of IT, but is equally symptomatic of cybersecurity practice in practice. In his article, Clemens Rambow, Offensive Security Consultant at secion GmbH, highlights the characteristics of the individual ransomware attack phases and draws a noteworthy conclusion.

The headlines about successful cyber attacks are not coming to an end - on the contrary. The topic of IT security has become a central issue for companies, and most of those responsible have realised the dangers posed by hacker attacks. But what about the IT security situation in municipalities? Both financially and in terms of knowledge, the cyber security of cities in Germany often lags behind the minimum standards. With what consequences?

The number of ransomware attacks has increased enormously in recent years. Due to the Corona pandemic, many employees still work from home. This situation has created new challenges for corporate IT security. Home office security vulnerabilities threaten both employees and the entire corporate network. 10 tips from our experts improve your ransomware protection and help to effectively close the home office security gaps.

Cyber threats know no seasons, no country borders and no opening hours. By now, almost every company is at risk of becoming the target of a planned cyber attack. If you do not have a fully developed cyber emergency plan ready in your drawer, the consequences can be drastic. With our hacking attack tips, we would like to provide you with first aid in the event of a cyberattack. Find out here which measures you and your IT security should definitely take - and why the help of security experts is advisable if the worst comes to the worst.