Detect anomalous behaviour patterns in the network: Why anomaly early detection is crucial for your IT security
by Svenja Koch
The constantly growing number of cyber attacks makes it clear that an IT security early warning system for the defence against cyber threats is becoming increasingly important. Such a system can be implemented with the help of network monitoring and anomaly detection. However, the basis for an efficient implementation is to ensure the complete control and analysis of the data.
There are a variety of cyber threats to corporate information security. Some of them are characterized by their particularly high threat potential or an insidious infection path. Other threats are difficult to detect and that is why they are so dangerous. This article looks at the five most dangerous cyber threats to network security today - and which defense techniques are effective.
Read more … The top 5 network security threats - and how to successfully fend them off!
How high should my IT security budget actually be?
by Svenja Koch
Do you actually know how high your IT security budget needs to be to ensure comprehensive security for your company? Which parameters drive up the costs for IT security, and where can you possibly save and optimize? In this article, you will learn which risks you should not ignore under any circumstances when determining your IT security budget.
Read more … How high should my IT security budget actually be?
GDPR at the workplace: You should definitely observe these requirements to avoid a data breach!
by Svenja Koch
On the one hand, the GDPR is intended to ensure the protection of personal data, but on the other hand, it is also intended to ensure the free movement of data within the European single market. Since its introduction in 2018, the GDPR has placed high demands on employers and employees - since then, a data protection breach can be sanctioned with high penalties. In this article, you will learn what you need to pay particular attention to as an employer when it comes to data protection in order to avoid a data breach.
Claroty study reveals vulnerabilities: Industrial facilities and KRITIS increasingly vulnerable to remote access
by Svenja Koch
For a long time, industrial controls were isolated local systems. Through further development and integration into the modern IT infrastructure, this industrial sector is now connected to networks and the Internet. Suddenly, critical ICS vulnerabilities are emerging that threaten industry and CRITIS. There is therefore an acute need to catch up in the area of industrial security - this is the conclusion of a recent study by Claroty.
The spectacular actions of the Conti Ransomware extortionists - a journey into the world of cybercriminals
by Svenja Koch
An unusual incident provides insights into the business of the ransomware developers of this malware. An apparently dissatisfied user of a Ransomware as a Service model published operating instructions and scripts of this platform. The information from the Conti Leak allows a look behind the scenes of a modern ransomware and how hackers copy as well as monetise the concept of cloud services.
IoT security vulnerability in the Kalay cloud platform! Over 83 million devices affected?
by Svenja Koch
IP cameras, digital video recorders or baby monitors definitely make our everyday lives more comfortable. IoT devices of all kinds are now used in millions of households and businesses around the world - and are now under attack! This is because a recently discovered IoT security vulnerability allows cyber attacks on the networked devices, where attackers can take control of the networked smart devices via the internet. The vulnerability, named CVE-2021-28372, is classified with a threat level of "critical".
Which antivirus solution protects best against ransomware? - None! And yet: no one needs to be encrypted!
by Svenja Koch
The expectation of being able to exclude certain types of security incidents by choosing a certain endpoint security solution does not fit the reality of IT, but is equally symptomatic of cybersecurity practice in practice. In his article, Clemens Rambow, Offensive Security Consultant at secion GmbH, highlights the characteristics of the individual ransomware attack phases and draws a noteworthy conclusion.
Virtually at the mercy of hackers: The IT security situation in public administration remains more than critical
by Svenja Koch
The headlines about successful cyber attacks are not coming to an end - on the contrary. The topic of IT security has become a central issue for companies, and most of those responsible have realised the dangers posed by hacker attacks. But what about the IT security situation in municipalities? Both financially and in terms of knowledge, the cyber security of cities in Germany often lags behind the minimum standards. With what consequences?
Important Update Exchange Hack: Attackers are now actively exploiting ProxyShell vulnerability!
by Svenja Koch
The BSI had already classified the Exchange hack for companies as "IT threat level: 4 / Red" in March - more than rightly, as our SOC team has discovered in many cases. Since Friday, 13 August, it has been officially confirmed by several parties that a wave of attacks on Microsoft Exchange Server via the ProxyShell vulnerability is approaching. Companies whose Exchange servers are still running on the patch status March 2021 and are accessible via the Internet are extremely vulnerable to these attacks and should patch urgently!