CyberInsights:
The blog about your IT security
CyberInsights
Find out about the most important developments in the field of cyber security and
IT risk management to successfully shape the digital transformation of your company.
Filter categories
Current articles in the area
CyberInsights
Digital extortion: correct behavior before and after a cyber attack
Growing digitization and the increasing degree of networking in companies go hand in hand with high potential. Many processes can be automated, silos closed and synergies exploited. But where there is light, there is also shadow – and in the case of cybercrime, extorting ransoms in the digital space is an extremely lucrative business. The …Spoofing: Recognize popular hacker method & effectively protect against attacks
Large corporations, federal authorities, entire counties – if you look at who was affected by cyberattacks last year, it quickly becomes clear how perfidious the machinations of hackers and criminal gangs are. Using different approaches and subtypes of malware, the attacks are primarily aimed at capturing sensitive data, selling it expensively on the darknet and …Ransomware: Increasing threat level for companies
Rapid technological progress, the polycrisis and a tense geopolitical situation: for cybercriminals, the past few months have truly been stellar. Time and again, hackers – including many now very professionally organized gangs – have succeeded in digitally disabling companies and authorities in the Federal Republic. Only last year, a district in Saxony-Anhalt had to declare …Bitwarden Vulnerability 2023
Affected products Bitwarden Criticality of the vulnerability(ies) medium Impact Open Source Bitwarden <= 2023.2.1 Description Password managers are basically a useful way to securely protect your credentials. The idea behind a password manager is that it securely stores the credentials for many of your accounts and requires the user to remember only one password (or …Cyber Resilience Act: Growing security requirements for products with digital components
With the Cyber Resilience Act, or CRA for short, the EU Commission provides for new mandatory security requirements for products with digital elements. We spoke with Ferdinand Grieger, Chief Legal Officer (CLO) of DGC and Chairman of the Supervisory Board of DGC Germany AG, about the changes that manufacturers of hardware and software will face …IT security for logistics and transport companies – How to raise your standards
Logistics and transport companies are increasingly relying on networking and digital technologies to make processes along their supply chain as efficient, transparent and scalable as possible. This brings IT security further into focus: cyberattacks are considered the greatest threat in the logistics environment. We explain which challenges IT security managers should be prepared for and …
Other News Offerings
Do you want to minimize the risks of your digital transformation?
Please get in touch with us.
Subscribe to our newsletter on the topic of cyber security
With our Cyberletter you are always up to date – about vulnerability reports, current IT threat scenarios and other relevant news from the field of cyber security and data security.