Data security and backups for businesses are easy to ensure in theory, but how does it work in reality? The current case study shows how easy it is...
Read moreAccording to LockBit, the Japanese bicycle parts manufacturer Shimano was the target of a ransomware attack and was apparently unwilling to pay the ransom. The blackmail gang...
Read moreCritical infrastructures are increasingly becoming the focus of cybercriminals. More than half of the attacks come from groups close to the state. The one from Cyentia Institute…
Read moreIoT devices are a popular target for cybercriminals. On the Darknet, these attacks are offered as a service. In particular, services for DDoS attacks carried out via IoT botnets...
Read moreIn a study, managers from the areas of security and IT operations commented on cyber resilience in their company. The majority expect an attack...
Read moreThe APT Activity Report shows that the EU, Israel and Ukraine are particularly affected by attacks by state-backed hacker groups. With their actions...
Read more“Ethical hackers” hack into corporate networks to identify security holes before attackers find them. This can be learned in a course. Cyber specialists are in short supply...
Read moreSoftware development and DevSecOps pipelines are popular targets for hackers. They can be better protected using the NIST framework. “The way software is developed...
Read moreAndroid released a new list of security vulnerabilities for Android 11, 12 and 13 in November. In addition to a critical gap, there is also…
Read moreA cyber attack with ransomware took place on the IT service provider Südwestfalen-IT on October 30.10.2023, 72. The provider supplies, among other things, XNUMX municipalities with IT services, which have been...
Read more