Cyber Security Blog

Dive with us into the world of hackers, data espionage, and attack defense - several times a week for free!

The expectation of being able to exclude certain types of security incidents by choosing a certain endpoint security solution does not fit the reality of IT, but is equally symptomatic of cybersecurity practice in practice. In his article, Clemens Rambow, Offensive Security Consultant at secion GmbH, highlights the characteristics of the individual ransomware attack phases and draws a noteworthy conclusion.

The headlines about successful cyber attacks are not coming to an end - on the contrary. The topic of IT security has become a central issue for companies, and most of those responsible have realised the dangers posed by hacker attacks. But what about the IT security situation in municipalities? Both financially and in terms of knowledge, the cyber security of cities in Germany often lags behind the minimum standards. With what consequences?

The number of ransomware attacks has increased enormously in recent years. Due to the Corona pandemic, many employees still work from home. This situation has created new challenges for corporate IT security. Home office security vulnerabilities threaten both employees and the entire corporate network. 10 tips from our experts improve your ransomware protection and help to effectively close the home office security gaps.

Cyber threats know no seasons, no country borders and no opening hours. By now, almost every company is at risk of becoming the target of a planned cyber attack. If you do not have a fully developed cyber emergency plan ready in your drawer, the consequences can be drastic. With our hacking attack tips, we would like to provide you with first aid in the event of a cyberattack. Find out here which measures you and your IT security should definitely take - and why the help of security experts is advisable if the worst comes to the worst.

Cyber threats are omnipresent and can threaten the existence of companies - this is now widely known. At the same time, there are still glaring gaps in the area of IT security measures in many companies. IT security management aims to comprehensively prepare companies for potential cyber threats. The current and future IT security situation requires a broad and specialised set-up of IT security management. A guide with 5 important measures that should not be missing in any case!

At the beginning of July 2021, a cyber attack occurred on the IT service provider Kaseya. This attack had a global impact, as it was an attack on the company's supply chain. In Sweden, for example, up to 800 branches of the supermarket chain Coop had to close for days because the cash register systems were not available. About a month after the incident, Kaseya is still struggling with the consequences of the attack. Our update on the consequences of the spectacular cyber attack!

With the proposed changes, the EU Commission wants to close gaps in existing laws and improve citizens' IT security. Current legislation no longer fits the digital reality. Anonymous accounts on crypto exchanges not only facilitate money laundering, they also provide hackers with an ideal environment for processing extortion payments as part of cyber attacks.

The growing number of cyberthreats and cyberattacks is placing ever greater demands on IT security. This now affects all companies - from individual companies to global corporations - primarily due to the high degree of digitalisation. As a result, new professions in IT security are constantly emerging. One of these is the cyber security analyst. A profession with a lot of responsibility, good earning opportunities and, above all, a high degree of future security.

At the beginning of June 2021, the German government extended the "Digital. Secure. Sovereign." by five years. At the same time, funding was increased from 180 to 350 million euros. These funds will flow into IT security research, among other things. Over the next few years, the federal government intends to drive forward IT security research and the digitization of SMEs with targeted funding programs. What funding programs has the federal government decided on and what is their scope?