Cyber Security Blog

Dive with us into the world of hackers, data espionage, and attack defense - several times a week for free!

What is DNS Tunneling?

by

DNS tunneling is a very sophisticated attack vector. The DNS protocol is simple and basically it is not suitable for cyber attacks. At the same time, DNS requests are among the most normal occurrences and there are few security measures that deal with DNS traffic. Therefore, the chance of success for attackers is quite high if they use DNS tunneling for attacks.

"People are always the best security vulnerabilities. I've never found it particularly hard to hack most humans."


Elliot Alderson in Mr. Robot, Season 1 Episode 5


Hacking and cybercrime are also popular topics in Hollywood. Typical for movies and series from the dream factory that deal with hackers and cyberthreats: they serve the complete range of the genre, from partly very realistic to completely fictional! In any case, the movies and series are often extremely exciting and very entertaining. Today, our IT Security Experts share their recommendations of the top 10 hacker movies and series. Enjoy!

What is a Remote Access Trojan (RAT)?

by

A remote access Trojan (RAT) is a Trojan that is capable of giving attackers complete control over a system. There are different versions of this malware, each of which provides the hackers with desired functions. In many cases, remote access Trojans work in a hidden and inconspicuous manner. This is precisely what makes this form of malware so dangerous.

Cyber threats have become part of everyday life for companies and organizations. Advanced persistent threats (APTs) pose a particular threat: targeted attacks on selected targets. This category also includes the wave that the Federal Office for the Protection of the Constitution explicitly warns German companies about in a recent communication.