WAS IST DIESE WOCHE IN DER HACKING-WELT PASSIERT?
Blog

US court system hacked - witness information compromised A targeted attack on the US federal court system's electronic records management system…
Netzwerk
Blog

Definition A router is a device that connects our home to the internet and often also provides a Wi-Fi network. Many people have a router at home,…
FROM BLIND SCANNING TO STRATEGIC EXPLOITATION
Blog

Chinese hackers attack via Ivanti & Fortinet VPNsTargeted attacks on Japanese organizations were carried out via already known vulnerabilities in…
WLAN
Blog

You're sitting in the laundrette waiting for your laundry and suddenly see a sign with Wi-Fi access details. You don't hesitate for long and connect…
Kunden Case
Blog

To answer this question, we asked Christian Obkirchner for an interview. Christian is Director of Information and Cybersecurity and a member of the…
Bugs
Blog

Is your mobile device slower than usual or constantly crashing? Are apps or programs popping up that you don't have installed? Are pop-ups constantly…
TISAX
Blog

Introduction ISO/IEC 27001:2022 and TISAX® (VDA ISA 6.0) are two important frameworks for information security - one international and…
Darkweb
Blog

The dark web explained: how it works and why it's so dangerous While most people access the internet through common web browsers such as Google…
Tasc Hacker
Blog

Why companies can't afford to ignore cyber security Cyber threats are evolving at an alarming rate. Attackers are constantly looking for new ways to…
Happy Women's Day
Blog

To the women who have shaped me - and the ones I'm proud to work with today! From my childhood to my career in the technology industry, I have been…