In our blog, we report on the latest news from the field of IT security. Stay up to date and get exclusive information on how you can protect yourself from cyber attacks and keep your data safe.
Iranian Cyber Attack on Israel
Life momentarily came to a halt in the Israeli cities of Jerusalem and Eilat as air raid sirens were triggered, despite there being no projectile in motion. The Israeli military announced that they suspect the false alarm to have been triggered by a cybersecurity attack at the municipal levels, not via military systems. Iran is suspected to have triggered the air raid sirens in Israel, a reminder of their growing cyber warfare capabilities.
Windows 11 and a Zero-Trust Core Part 1
The need for modern security principles and end-to-end protection is as important as never and therefore Windows 11 was built on a principle of Zero-Trust. The Zero-Trust model reminds of the Presumption of Guilt within Law: a defendant is guilty until proven innocent. In computers, this would mean that no device or user can have access until security and integrity is proven. Microsoft has also improved baselines by raising the requirements for both hardware and software to ensure a baseline protection from “chip to cloud”.
Ransomware: Definition, FAQs and Prevention
Ransomware, from the English "ransom software", is classified as aggressive malware that encrypts hard drives of PCs and other devices and locks out users until a ransom is paid. The classic consequences of a ransomware attack include downtimes and data theft.
SRH Target of Hacker Attack
Once again, the inferior and substandard security posture of German SMEs is punished! The educational and health conglomerate SRH has become a victim of a cyber-attack. National facilities are affected, including ones in Heidelberg and Neckargemünd.
Phishing: What it is and how you can prevent it
hishing represents a criminal conduct, a subcategory of Social Engineering. A Phishing attack targets unsuspecting employees or persons and urges them to share sensitive and personal information like usernames, passwords and credit card information via trustworthy looking emails that are sent to millions of users and which evade common spam filters.
Cyber Attacks on Parliamentarians: Government criticizes Russia
The upcoming German "Bundestagswahl" (parliamentarian Election) was shocked once more, for it has been the third time it was a victim of cyber-attacks. National intelligence and security agencies are reporting numerous foreign intelligence agency attacks on German parliamentarians. The German federal government is formulating concrete accusations against hacker groups with alleged ties to Russia which have been suspects of said cyber-attacks. Findings and insights have been uncovered that tie the Ghostwriter group and their activities to the Russian government and specifically the military intelligence agency GRU, so a speaker of the German State Department.
Free Ransomware-Checks to fight Ransomware 3.0
The new era of Ransomware has begun - Ransomware 3.0! What has been till today THE way to protect against Ransomware, is now undermined. Backups, or companies own shiny knight in armor, are helpless against the new strains of Ransomware.
T-Mobile US Hacker Attack
After a confirmed cyber attack against T-Mobile US, so the german Tagesschau, the amount of damage is clarified: Millions of customer data, including but are not limited to - social security numbers and driver license information were leaked. Lets do some numbers - the attackers managed to steal data with information regarding 7.8 Million contract customers, 40 Million old or potential customers and almost 1 Million of customers with credit accounts. The numbers tell a scary story, but according to T-Mobile, the data leak has been closed and is asking its customers to change passwords and PINs.
German SMEs, cyberattacks and billions in damages
German SMEs have been particularly hit by cyberattacks, "no one is spared", according to Bitkom President Achim Berg. In 2020 and 2021 alone, almost nine out of ten companies were affected by a cyberattack, be it data theft, espionage or sabotage.