
Vulnerability Scanners and How to Protect Your Company From and With Them
Vulnerability scanners are often used during security audits. The goal: to be one step ahead of the cybercriminals!
Browse through exciting articles, current news and helpful tips & tricks from our experts on all aspects of cybersecurity.
Vulnerability scanners are often used during security audits. The goal: to be one step ahead of the cybercriminals!
A bug bounty program and a penetration test are both important measures to improve the security level of a system. However, there are important differentiators between the two that need to be understood before deciding which one to use.
Configuration of a local Windows firewall and what and how it can protect against.
A modern Active Directory environment consists of many different components. There are clients, servers, databases, users, applications and much more. It is easy to lose track of everything (especially as a Red Team). The BloodHound tool can help here.
What are the most common security vulnerabilities in web applications? What does an attacker need to do to find and exploit them? And how can developers protect their web applications against them? Answers to these questions as well as practical hands-on examples are provided by PortSwigger’s Web Security Academy.
Black Friday and Cyber Monday are not only popular with shoppers, but also with fraudsters. Here are 10 tips on how to protect yourself from such scams.
Is your company protected against cyberattacks? Have you implemented protective measures, but can’t determine exactly whether they are sufficient and also achieve the desired effect, or where there may still be a need?
IoTGoat is intentionally vulnerable software, like that found on routers for example.
by Sandro Affentranger Data leaks – incidents in which unauthorized persons have gained access to data collections – occur from time to time. To prevent user passwords from being compromised in such a case, it is important that they are not simply stored in plain text. Instead, they should always be stored “hashed”. This article looks at which hash functions are suitable for this purpose.
by Lena Reitzle The first part of this article covered the first five items C1 through C5 of the OWASP Top 10 Proactive Controls. This second part picks up where we left off and takes a closer look at Proactive Controls C6 through C10.
Never miss the latest news about cybersecurity topics again? Subscribe to our newsfeed on LinkedIn.
Subscribe to our news feed on LinkedIn and register to receive our newsletter.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 12:00 p.m. and 1:00 p.m. – 5:00 p.m (exception: customers with SLA – please call the 24/7 IRFA emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: