Top-10 High-Risk Vulnerabilities 2026
2026 marks a turning point in the world of cybersecurity. Security vulnerabilities are no longer just discovered; they are often actively exploited within days. Developers, IT architects, and entrepreneurs need to understand which vulnerabilities are particularly critical at the moment.
In this…
What happened in the hacking world this week? (KW 32/2025)
US court system hacked - witness information compromised
A targeted attack on the US federal court system's electronic records management system PACER has led to a potential data leak. Particularly critical: in addition to internal documents, information about protected witnesses may also have…
Router - What is it?
Definition
A router is a device that connects our home to the internet and often also provides a Wi-Fi network. Many people have a router at home, but very few know exactly what tasks it actually performs. For many people who do not have an IT background, it may come as a surprise that the router…
What happened in the hacking world this week?
Chinese hackers attack via Ivanti & Fortinet VPNsTargeted attacks on Japanese organizations were carried out via already known vulnerabilities in Ivanti and Fortinet VPN systems. The campaigns show once again how critical unpatched systems can be in production environments.Microsoft closes 137…
VPN: The solution for public WLANs?
You're sitting in the laundrette waiting for your laundry and suddenly see a sign with Wi-Fi access details. You don't hesitate for long and connect to the laundrette's public Wi-Fi. Here I explain why this might not be the best idea and what you should do instead.
No privacy on public networks
…
What do our customers actually think of us?
To answer this question, we asked Christian Obkirchner for an interview. Christian is Director of Information and Cybersecurity and a member of the management team at QAware GmbH in Munich. As CISO, he is responsible for the company's information security, governance and risk management.You can read…
Malware: What is it?
Is your mobile device slower than usual or constantly crashing? Are apps or programs popping up that you don't have installed? Are pop-ups constantly appearing on your screen? Or does your mobile device simply feel strange? Then your device could be infected with malware. Here we explain what…
ISO/IEC 27001:2022 vs. TISAX VDA ISA 6.0 - A comparison of both standards
Introduction
ISO/IEC 27001:2022 and TISAX® (VDA ISA 6.0) are two important frameworks for information security - one international and industry-neutral, the other developed specifically for the automotive industry. Both help companies to build a robust information security management system (ISMS),…
The dark web explained: how it works and why it is so dangerous
The dark web explained: how it works and why it's so dangerous
While most people access the internet through common web browsers such as Google Chrome, Safari and Edge, there are deeper levels of the internet that are inaccessible to the average user: The Darkweb, or Dark Net.
It is a collection…
Penetration testing - one step ahead
Why companies can't afford to ignore cyber security
Cyber threats are evolving at an alarming rate. Attackers are constantly looking for new ways to infiltrate networks, steal sensitive data and disrupt business operations. Many companies believe they are safe - until they become the next victim of…









