Browse through exciting articles, current news and helpful tips & tricks from our experts on all aspects of cybersecurity.
In the cover story of the latest issue 04/2022 of iX magazine, Frank Ully, Head of Research, takes a closer look at the security of the Azure Active Directory identity service, which is a popular target for attackers.
From time to time, ships are blown off course, wrecked or, in the worst case, sink together with their cargo. The same can happen to the data that is sent over the Internet every day: It can deviate from its usual route and reach its destination in a big detour, but it can also end up with the wrong recipient altogether and thus be lost to the actual target – usually unintentionally, but in some cases also intentionally.
Alert fatigue refers to the phenomenon of cyber analysts being overloaded by the high number of alerts issued by security tools. This can lead to analysts overlooking or even ignoring alerts that indicate real attacks in the flood of false positives. This puts the security of the company in question at risk. Find out what the exact risks are and what measures you can take against them here.
Penetration testers use their hacking skills to help organizations protect themselves from cyber criminals.
by Fabian Murer On 9 December 2021, a vulnerability (CVE-2021-44228) in the popular Java library Log4j was published.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 12:00 p.m. and 1:00 p.m. – 5:00 p.m (exception: customers with SLA – please call the 24/7 IRFA emergency number).
Private individuals please contact your trusted IT service provider or the local police station.