Blog

2026 marks a turning point in the world of cybersecurity. Security vulnerabilities are no longer just discovered; they are often actively exploited within days. Developers, IT architects, and entrepreneurs need to understand which vulnerabilities are particularly critical at the moment. In this…
WAS IST DIESE WOCHE IN DER HACKING-WELT PASSIERT?
Blog

US court system hacked - witness information compromised A targeted attack on the US federal court system's electronic records management system PACER has led to a potential data leak. Particularly critical: in addition to internal documents, information about protected witnesses may also have…
Netzwerk
Blog

Definition A router is a device that connects our home to the internet and often also provides a Wi-Fi network. Many people have a router at home, but very few know exactly what tasks it actually performs. For many people who do not have an IT background, it may come as a surprise that the router…
FROM BLIND SCANNING TO STRATEGIC EXPLOITATION
Blog

Chinese hackers attack via Ivanti & Fortinet VPNsTargeted attacks on Japanese organizations were carried out via already known vulnerabilities in Ivanti and Fortinet VPN systems. The campaigns show once again how critical unpatched systems can be in production environments.Microsoft closes 137…
WLAN
Blog

You're sitting in the laundrette waiting for your laundry and suddenly see a sign with Wi-Fi access details. You don't hesitate for long and connect to the laundrette's public Wi-Fi. Here I explain why this might not be the best idea and what you should do instead. No privacy on public networks …
Kunden Case
Blog

To answer this question, we asked Christian Obkirchner for an interview. Christian is Director of Information and Cybersecurity and a member of the management team at QAware GmbH in Munich. As CISO, he is responsible for the company's information security, governance and risk management.You can read…
Bugs
Blog

Is your mobile device slower than usual or constantly crashing? Are apps or programs popping up that you don't have installed? Are pop-ups constantly appearing on your screen? Or does your mobile device simply feel strange? Then your device could be infected with malware. Here we explain what…
TISAX
Blog

Introduction ISO/IEC 27001:2022 and TISAX® (VDA ISA 6.0) are two important frameworks for information security - one international and industry-neutral, the other developed specifically for the automotive industry. Both help companies to build a robust information security management system (ISMS),…
Darkweb
Blog

The dark web explained: how it works and why it's so dangerous While most people access the internet through common web browsers such as Google Chrome, Safari and Edge, there are deeper levels of the internet that are inaccessible to the average user: The Darkweb, or Dark Net. It is a collection…
Tasc Hacker
Blog

Why companies can't afford to ignore cyber security Cyber threats are evolving at an alarming rate. Attackers are constantly looking for new ways to infiltrate networks, steal sensitive data and disrupt business operations. Many companies believe they are safe - until they become the next victim of…