Cyber­Insights:
The blog about your IT security

CyberInsights

Find out about the most important developments in the field of cyber security and
IT risk management to successfully shape the digital transformation of your company.

Filter categories

Current articles in the area
CyberInsights

  • 04.08.2022Insights

    BSIG: The BSI as a hub in the defense against cyber threats

    What changes and tasks result from the updated IT Security Act 2.0 – and which companies are affected? Ferdinand Grieger, Chief Legal Counsel of DGC Switzerland AG, presents the important innovations: This time, the question is what role the BSI plays in the implementation of IT-SiG 2.0 and what impact this may have on the …

    Weiterlesen …

  • 18.07.2022Insights

    51% Attack: How blockchain providers protect themselves from cyberattacks

    Cyberattacks are a real risk even in the blockchain environment. The Ronin Bridge Hack shows just how large the scale can be: this 51% attack stole crypto assets worth more than $600 million. Blockchain providers are called to action – but how exactly can vulnerabilities and security gaps in digital infrastructures be identified, closed and …

    Weiterlesen …

  • 12.07.2022Vulnerabilities

    Trickbot: Warning about possible phishing attacks by hacker group

    According to an article by The Hacker News, the Trickbot hacker group is now also involved in the current conflict between Russia and Ukraine by carrying out targeted phishing attacks against targets in Ukraine. These phishing emails are designed to make recipients of these mails fear a nuclear war and also contain malicious malware that …

    Weiterlesen …

  • 04.07.2022Practical

    Zero-day exploit: find security vulnerabilities before hackers do

    Time and again, zero-day exploits are the cause of massive data leaks. Protecting against them is a particular challenge in IT security. Learn here what zero-day exploits are, what makes them so dangerous, and what organizations can do to minimize the risk of a zero-day exploit. What is a zero-day exploit? Among the numerous IT …

    Weiterlesen …

  • 21.06.2022Insights

    IT Security Act 2.0: Changes for companies

    With the IT Security Act 2.0 (IT-SiG 2.0), an important law came into force in Germany that is intended to protect critical infrastructures (CRITIS) in particular. In this blog post, Ferdinand Grieger, Chief Legal Counsel of DGC Switzerland AG, describes related tasks and challenges, shows where companies stand in 2022 and explains how DGC can …

    Weiterlesen …

  • 08.06.2022Insights

    Smishing: This is how dangerous the SMS hacker method is for companies

    SMS from unknown senders can cause a lot of damage, especially on smartphones used for business purposes. Attackers often use a method called smishing to do this. We explain how SMS phishing works and show how companies can minimize the risks. Smishing: How SMS phishing works Through smishing, hackers gain access to mobile devices such …

    Weiterlesen …

Do you want to minimize the risks of your digital transformation?

Please get in touch with us.

Subscribe to our newsletter on the topic of cyber security

With our Cyberletter you are always up to date – about vulnerability reports, current IT threat scenarios and other relevant news from the field of cyber security and data security.

By registering, I accept the handling of my personal data (§13 DSGVO) and agree to the privacy policy.

Follow us on