-
LLMjacking: Tactics and best practices for defense
Since the discovery of LLMjacking in May 2024…
March 26, 2025 0 Comments -
25 years with numerous cybersecurity challenges
As we approached the year 2000, we looked…
March 24, 2025 0 Comments -
AI poses growing challenges for data protection in 2025
With the introduction of generative AI into many companies,…
March 22, 2025 0 Comments -
Threats in the European retail sector
In 2024, business services companies were the most frequently attacked sector…
March 21, 2025 0 Comments
EDR killers are a serious threat
EDR killers are malicious tools that disable the EDR software of compromised systems, leaving them vulnerable to further threats. The danger…
NIS2 – how a SaaS infrastructure contributes
It is estimated that up to 40.000 German companies will be affected by NIS2 in the future. The directive is intended to increase cyber resilience...
Zero-Trust Architecture – Opportunities & Risks
Trust is good, control is better: The Zero Trust architecture turns traditional security models on their head by checking every access…
DeepSeek and Qwen are the tools of hackers
Criminals are increasingly exploiting DeepSeek and Qwen. They use jailbreaking techniques to create their malicious content to commit financial and information theft…
Passkeys: Efficient management supports CISOs
New security passkey management solution supports organizations with secure authentication. It gives IT complete control over the entire…
These are the most important security vulnerabilities and attack techniques
The number of reported security vulnerabilities increased by 2024 percent in 38. With the increasing dependence on software systems, the risk of...