
FAQ Cyber Threat Hunting: 10 most frequently asked questions about proactively hunting cyber threats!
by Svenja Koch
You are still new to the topic of Cyber Threat Hunting and have many questions that you would like to have answered by a real expert? No one can do this better than a long-standing expert from the Cyber Threat Hunting scene, which originated in the USA: Chris Brenton from Active Countermeasures INC, our partner for Active Cyber Defense, answers the 10 most frequently asked questions about threat hunting in today's blog post.
The top 5 threat actors in cyberspace - and what IT security measures you can take to protect yourself from them
by Svenja Koch
Ransomware and Advanced Persistent Threats are challenging IT security - and cyberattacks are increasing not only in scope but also in professionalism as technology continues to advance. We present the five most relevant threat actors in the field of cyber threats - and provide tangible tips on which IT security strategies you can use to protect your network most reliably.
Click Studios informed its customers last Friday about a successful supply chain attack on the password manager PASSWORDSTATE. The attackers succeeded in installing a malicious in-place update on the computers of the affected users between 20 and 22 April.
Read more … Supply chain attack on password manager: Attack pattern from SolarWinds again!
Hackers in a money frenzy: How do I recognise cryptojacking and protect my company against it?
by Svenja Koch
Cryptojacking is quite difficult to detect compared to other cyberthreats. At the same time, there are some very characteristic features that suggest an infection with mining software. In many cases, classic IT security defence mechanisms are not able to detect cryptomining. This is because virus scanners, for example, do not recognise many of the techniques used as harmful.
The end of Privacy Shield - What is the status and what are the consequences for companies and internet users?
by Svenja Koch
The standard for handling European personal data in the US is a thing of the past. This does not mean the end of any data transfer from Europe to the USA - but, as the Luxembourg judges of the ECJ emphasised, data protection authorities are obliged to prohibit the transfer of data as soon as the standard contractual clauses are not complied with in the recipient country. Find out in this article what this all means for companies and whether private internet users also have to fear consequences.
Image loss Luca app: What does the security vulnerability found mean for the future of the Luca system?
by Svenja Koch
The Luca app has been available since March 2021. This app makes it possible to trace contacts in the event of infection with COVID-19 by registering whereabouts. The federal government favored a digital system, allowing a seamless transfer of information without time delay. Now the group LucaTrack has discovered and made public a serious security vulnerability in the app. What does this mean for users of the app?
BSI publishes survey on increased attack surface for cybercriminals through the home office - a comment by Marcus Henschel
by Svenja Koch
The rapid increase in home offices during pandemic times has drastically increased the attack surface for cybercriminals in Germany. It has a relevant impact on the information security of commercial enterprises. The German Federal Office for Information Security (BSI) surveyed around 1,000 companies and businesses in a representative survey. Marcus Henschel, CEO of secion, comments on the study results, which were presented yesterday at a digital press conference in Cologne.
Cyber threats in pandemic times - How hackers respond to new opportunities and attack surfaces
by Svenja Koch
A contagion threat of a very different nature has spread in the shadow of the pandemic - the danger of "infecting" IT systems with malware of all kinds. In addition to a drastically increased number of cyberattacks worldwide, it is above all the professionalism with which cybercriminals respond to new opportunities and attack surfaces in times of the Corona pandemic, causing IT security great concern.
Microsoft must once again close security vulnerabilities in its Exchange Server email software with an update. The software company yesterday released updates for Exchange versions 2013, 2016, and 2019.
Read more … Attention! Four new vulnerabilities in Exchange Server mail software!