Cyber Security

CYBER RESILIENCE MADE IN GERMANY

Our IT security experts inform you about the current threat situation in the IT sector, present new developments in protection against cyber attacks and explain the most important technical terms.

Why a contemporary TLS configuration is important

Cyber Security

Why a contemporary TLS configuration is important

  • Daniel Wolf
  • June 1, 2023

Transport Layer Security (TLS), known under the predecessor, Secure Sockets Layer (SSL), is a cryptographic protocol designed to secure communications over computer networks. HTTPS is an extension of the Hypertext Transfer Protocol that uses TLS to encrypt the communication between the browser and web server. The TLS protocol provides confidentiality, integrity, and authenticity through cryptography. […]

READ MORE
Protect Your Online Presence: Understanding the Connection Between DDoS Attacks and Other Cyber Threats

Cyber Security

Protect Your Online Presence: Understanding the Connection Between DDoS Attacks and Other Cyber Threats

  • Lisa Fröhlich
  • May 11, 2023

Cyber threats cause major problems for individuals and businesses in the digital age. These multiple threats can mean financial losses, cause reputational damage, or compromise sensitive data.   Some cyber threats, such as “credential stuffing” or “spambot spamming,” can result in consequences that are equally associated with Distributed Denial of Service (DDoS) attacks.   Even legal methods […]

READ MORE
Protective Measures: New “proxyjacking” attack exploits Log4j vulnerability

Cyber Security

Protective Measures: New “proxyjacking” attack exploits Log4j vulnerability

  • Erol Erdogan
  • May 11, 2023

In a recent discussion with colleagues, we talked about what motivates cybercriminals to attack companies or government agencies. Our discussion revealed that in many cases, the motivation is either financial, based on youthful recklessness, or, very topical now, based on the attacker’s political persuasion. In all cases, the impact of these attacks can result in […]

READ MORE
Part 1: The True cost of DDoS

Cyber Security

Part 1: The True cost of DDoS

  • Fabian Sinner
  • May 2, 2023

Denial of Service attacks are an unfortunate reality everyone on the internet is faced with. And for whatever reason, it is a topic that victims are reluctant to discuss openly. So when it does occur many organizations are unfortunately under prepared. The costs of a DDoS attack are manifold When calculating the cost of a […]

READ MORE
Killnet, NoName057(16) and Anonymous Sudan are on the rampage – politically motivated attacks on critical sectors in Europe are increasing

Cyber Security

Killnet, NoName057(16) and Anonymous Sudan are on the rampage – politically motivated attacks on critical sectors in Europe are increasing

  • Lisa Fröhlich
  • April 13, 2023

Before Easter, there was a series of DDoS attacks on websites operated by state authorities and the police. The attackers’ targets included, for example, the state portals of Saxony-Anhalt and Schleswig-Holstein and the websites of the police in Brandenburg and Lower Saxony. There were also similar reports from Mecklenburg-Western Pomerania and the German Federal Ministry […]

READ MORE
GDPR and its consequences – What to look out for when choosing a CDN provider and DDoS protection

Cyber Security

GDPR and its consequences – What to look out for when choosing a CDN provider and DDoS protection

  • Lisa Fröhlich
  • March 21, 2023

In recent years, many companies have relied on a content delivery network (CDN) for better website performance and combined it with web DDoS protection, usually from the same provider, to secure their websites and applications. However, more and more European enterprises are increasingly selecting European Union (EU)-based providers rather than relying on non-European protection solutions. […]

READ MORE
Infrastructure Protection vs. Web Protection

Cyber Security

Infrastructure Protection vs. Web Protection

  • Sean Power
  • January 24, 2023

DDoS protection is not a “one size fits all” product, and in the event of an attack, the pressure to find a solution increases. Often, it’s a matter of an ad hoc available – in doubt, any – solution.  Unfortunately, an unsuitable solution provides minimal protection at best and at worst, victims of a DDoS […]

READ MORE
Road clear for NIS2 – why the new directive is better protection against hacker attacks.

Cyber Security

Road clear for NIS2 – why the new directive is better protection against hacker attacks.

  • Lisa Fröhlich
  • December 8, 2022

On November 10, 2022, the European Parliament in Brussels approved the draft for the revised Network and Information Systems Security Directive (NIS2). The new directive is intended to better protect European network and information systems from hacker attacks. Once the directive becomes law as new legislation, all 27 EU member states must incorporate the requirements […]

READ MORE
A secure data exchange between the EU and the USA: A never-ending story and why “Made in Germany” offers a solution

Cyber Security

A secure data exchange between the EU and the USA: A never-ending story and why “Made in Germany” offers a solution

  • Lisa Fröhlich
  • October 31, 2022

In March 2022, the European Union and the United States unveiled the follow-up to the Privacy Shield agreement: the Trans-Atlantic Data Privacy Framework. The new agreement, also known as “Privacy Shield 2.0,” is intended to ensure the free and secure exchange of data between the EU and the United States. For more than two years, […]

READ MORE
VOIP and DOS / SPIT – History and Challenges

Cyber Security

VOIP and DOS / SPIT – History and Challenges

  • Erol Erdogan
  • June 28, 2022

After nearly 20+ years of working in the Telecom arena, I’ve seen a number of developments and challenges within the industry. One such challenge has been the advent of SPIT (Spam Over Internet Telephony), which is unsolicited bulk messages sent over a VOIP system and essentially ‚clogging‘ up the VOIP system altogether. While SPIT seems […]

READ MORE
What is Ransom DDoS?

Cyber Security

What is Ransom DDoS?

  • Fabian Sinner
  • June 20, 2022

When cybercriminals combine a DDoS attack with a ransom demand, this is known as a ransom DDoS attack (RDDOS). The damage in such a case can be considerable and should not be taken lightly. Typical distributed denial of service attacks are now part of everyday business life. The numbers are alarmingly high – especially since […]

READ MORE
HTTP and HTTPS: What is the difference?

Cyber Security

HTTP and HTTPS: What is the difference?

  • Fabian Sinner
  • June 14, 2022

The HTTP and HTTPS protocols are important for communication on the Internet and are therefore terms often encountered while browsing the net. But what is the difference between these two protocols? We have all the details. As soon as you enter and confirm an address in the web browser, a communication protocol is started in […]

READ MORE
X