Cyber Security Blog

Dive with us into the world of hackers, data espionage, and attack defense - several times a week for free!

What is DNS Tunneling?

by

DNS tunneling is a very sophisticated attack vector. The DNS protocol is simple and basically it is not suitable for cyber attacks. At the same time, DNS requests are among the most normal occurrences and there are few security measures that deal with DNS traffic. Therefore, the chance of success for attackers is quite high if they use DNS tunneling for attacks.

"People are always the best security vulnerabilities. I've never found it particularly hard to hack most humans."


Elliot Alderson in Mr. Robot, Season 1 Episode 5


Hacking and cybercrime are also popular topics in Hollywood. Typical for movies and series from the dream factory that deal with hackers and cyberthreats: they serve the complete range of the genre, from partly very realistic to completely fictional! In any case, the movies and series are often extremely exciting and very entertaining. Today, our IT Security Experts share their recommendations of the top 10 hacker movies and series. Enjoy!

What is a Remote Access Trojan (RAT)?

by

A remote access Trojan (RAT) is a Trojan that is capable of giving attackers complete control over a system. There are different versions of this malware, each of which provides the hackers with desired functions. In many cases, remote access Trojans work in a hidden and inconspicuous manner. This is precisely what makes this form of malware so dangerous.

Cyber threats have become part of everyday life for companies and organizations. Advanced persistent threats (APTs) pose a particular threat: targeted attacks on selected targets. This category also includes the wave that the Federal Office for the Protection of the Constitution explicitly warns German companies about in a recent communication.

Every year, the Allianz insurance group publishes its Risk Barometer. In this context, the insurer asks more than 2,500 companies from almost 90 countries and 22 sectors which risks they see as the greatest threat to their own business activities. The 2022 report shows a significant change in companies' perceptions compared to the previous year.

IT security is a top priority at Gartner KG, one of Europe's leading logistics service providers. The company's project managers were looking for a service provider who could bring the test quality and thus also the resilience of the IT infrastructure to the next level. They found the right sparring partner in secion.

The security vulnerability in the Java framework Log4Shell caused an uproar in the IT world. Hackers discovered the vulnerability in December 2021 and exploited it on the spot. Since then, the incidents have been accumulating, and the full extent cannot yet be estimated. At the same time, security experts warn about the long-term consequences of the vulnerability. Due to the wide distribution and the particular way Log4Shell is implemented, an unknown number of users are still at risk.