Danny de Vreeze, VP IAM at Thales 1 AI will change the conditions for identity verification and create legislation The growing potential and importance of AI in 2023 is hard to ignore. It is already making short work of data analysis, image generation and all manner...
WinRAR vulnerability
WinRAR, the widely used programme for compressing and archiving files, had a serious security vulnerability in older versions. This vulnerability allowed potential attackers to execute arbitrary code after opening a suitably prepared archive. A security researcher...
Collected comments on the BKA Cybercrime Report 2022
On 15.08.2023, the current "Bundeslagebild Cybercrime 2022" of the BKA was published. Here are the most important findings of the report at a glance: 136,865 registered cases in 2022, decrease of 6.5% compared to 2021 Ransomware and phishing still the biggest threats...
AI-powered whaling attacks threaten CEOs, MPs and the military
Comment by Richard Werner, Business Consultant at Trend Micro "Whaling" is all about the big catch. The targets of cybercriminals are executives of successful companies, high-ranking officials and the military. The aim is to steal information or siphon off large sums...
Stolen master key: ownCloud: Microsoft fails to live up to its key role as hyperscaler
Holger Dyroff, Co-Founder and COO of ownCloud (Source: ownCloud) Stolen master keys, lack of transparency and questionable technological solutions: The scandal surrounding the latest security breach at Microsoft is not abating. For Holger Dyroff, co-founder and COO of...
Criticism of the Bundesverband IT-Sicherheit e.V. on the non-acceptance of the constitutional complaint against the legalised use of “State Trojans”.
In 2018, the Bundesverband IT-Sicherheit e.V. (TeleTrusT) filed a constitutional complaint against the use of "state Trojans", which was legalised by law. By decision of 17 April 2023, the Federal Constitutional Court did not accept the constitutional complaint for...
No fear of DSGVO-compliant requests for information and deletion
Author: Gregor Bieler, Co-CEO at APARAVI According to the GDPR, companies are obliged to answer requests for information and deletion promptly and truthfully. According to Article 15 of the GDPR, every person has the right to information about any data stored about...
Do not reveal confidential data to ChatGPT
Generative AI systems like ChatGPT and Co. receive a lot of attention and are fed data by thousands of users every day. More and more companies are using the technologies and applying them to a wide variety of projects and processes. Above all, the tools are used for...
Cybersecurity: Why DMARC will become the standard
French companies are lagging behind on DMARC, a technical specification that secures domain names and email addresses and provides protection against phishing. Large companies like Chronopost, which have to send SMS and emails to their partners and thousands of...
Backdoor in 3CX VoIP software
Comment: Dr Johannes Ullrich, Dean of Research at the SANS Technology Institute 3CX is a company that sells voice-over-IP systems. Last week, customers complained that 3CX's VoIP software was triggering anti-virus warnings. 3CX initially dismissed this as a false...