Possible uses and risks of open source software - These 6 aspects you should consider when using it!
by Svenja Koch
A large number of different software platforms are used within companies. Especially for certain functions outside the central systems, companies like to use open source software (OSS). However, the use of such software does not only have advantages. Open source software can also become an IT security risk. When there is a risk of cyber attacks due to the use of open source software is only one aspect that is highlighted in this blog post.
Blackmailing ransomware, highly professional Advanced Persistent Threats or data espionage through social engineering: the more and the more elaborate an IT security challenge, the greater the media interest. Yet neither ransomware nor APTs are among the most frequently used attack strategies of hackers. Rather, the criminals exploit a widespread characteristic of us humans for the most popular form of cyber attack.
The so-called Advanced Persistant Threats (ATP) are creating an increasingly complex threat situation. This massively aggravates the risk situation in companies and makes the defence against threats for cyber security more and more challenging. Successful defence against such cyber threats begins with prevention. For this, it is necessary to understand the attack patterns of the hackers. This is precisely where cyber threat modelling or hunting comes in.
The use of artificial intelligence (AI) is also playing an increasingly important role in cyber security. Artificial intelligence shows its strengths above all in the early detection of cyber threats or in the real-time monitoring of IT infrastructures. However, uncontrolled use of AI is definitely dangerous! In this article, you will learn what artificial intelligence can do in the area of cyber security and how AI can support cyber threat hunting and threat intelligence.
With the passed IT Security Act 2.0 (IT-SIG), anomaly detection for CRITIS companies and organisations is enshrined in law. Now it is time for operators of critical infrastructures to act: According to IT-SIG 2.0, they must implement appropriate protective measures to defend against cyber attacks within one year that comply with the current legislation. How can it be done faster?
Industry 4.0 and the IoT are no longer a marginal phenomenon - but have long since arrived in many manufacturing companies. IT security in industry must counter the new threat situations and try to stay one step ahead of the cyber criminals. With specialized service providers and services, IT security in industry can counter all cyber attacks!
After SolarWinds and Passwordstate: Do you still have a backdoor open in your supply chain security?
by Svenja Koch
Supply chains in companies are increasingly turning out to be gateways for cyber attacks. In supply chain attacks, components may already be compromised when they arrive at the company. ENISA, the EU's cybersecurity agency, warns that companies underestimate the cyber threats posed by supply chain attacks and are usually not sufficiently prepared for such cyberattacks. What is worth knowing about this is highlighted in today's blog post.
FAQ Cyber Threat Hunting: 10 most frequently asked questions about proactively hunting cyber threats!
by Svenja Koch
You are still new to the topic of Cyber Threat Hunting and have many questions that you would like to have answered by a real expert? No one can do this better than a long-standing expert from the Cyber Threat Hunting scene, which originated in the USA: Chris Brenton from Active Countermeasures INC, our partner for Active Cyber Defense, answers the 10 most frequently asked questions about threat hunting in today's blog post.
The top 5 threat actors in cyberspace - and what IT security measures you can take to protect yourself from them
by Svenja Koch
Ransomware and Advanced Persistent Threats are challenging IT security - and cyberattacks are increasing not only in scope but also in professionalism as technology continues to advance. We present the five most relevant threat actors in the field of cyber threats - and provide tangible tips on which IT security strategies you can use to protect your network most reliably.
Click Studios informed its customers last Friday about a successful supply chain attack on the password manager PASSWORDSTATE. The attackers succeeded in installing a malicious in-place update on the computers of the affected users between 20 and 22 April.