Comments
WinRAR vulnerability

WinRAR vulnerability

WinRAR, the widely used programme for compressing and archiving files, had a serious security vulnerability in older versions. This vulnerability allowed potential attackers to execute arbitrary code after opening a suitably prepared archive. A security researcher...

Collected comments on the BKA Cybercrime Report 2022

Collected comments on the BKA Cybercrime Report 2022

On 15.08.2023, the current "Bundeslagebild Cybercrime 2022" of the BKA was published. Here are the most important findings of the report at a glance: 136,865 registered cases in 2022, decrease of 6.5% compared to 2021 Ransomware and phishing still the biggest threats...

AI-powered whaling attacks threaten CEOs, MPs and the military

AI-powered whaling attacks threaten CEOs, MPs and the military

Comment by Richard Werner, Business Consultant at Trend Micro "Whaling" is all about the big catch. The targets of cybercriminals are executives of successful companies, high-ranking officials and the military. The aim is to steal information or siphon off large sums...

No fear of DSGVO-compliant requests for information and deletion

No fear of DSGVO-compliant requests for information and deletion

Author: Gregor Bieler, Co-CEO at APARAVI According to the GDPR, companies are obliged to answer requests for information and deletion promptly and truthfully. According to Article 15 of the GDPR, every person has the right to information about any data stored about...

Do not reveal confidential data to ChatGPT

Do not reveal confidential data to ChatGPT

Generative AI systems like ChatGPT and Co. receive a lot of attention and are fed data by thousands of users every day. More and more companies are using the technologies and applying them to a wide variety of projects and processes. Above all, the tools are used for...

Cybersecurity: Why DMARC will become the standard

Cybersecurity: Why DMARC will become the standard

French companies are lagging behind on DMARC, a technical specification that secures domain names and email addresses and provides protection against phishing. Large companies like Chronopost, which have to send SMS and emails to their partners and thousands of...

Backdoor in 3CX VoIP software

Backdoor in 3CX VoIP software

Comment: Dr Johannes Ullrich, Dean of Research at the SANS Technology Institute 3CX is a company that sells voice-over-IP systems. Last week, customers complained that 3CX's VoIP software was triggering anti-virus warnings. 3CX initially dismissed this as a false...

Do hackers like to go to school?

Do hackers like to go to school?

Expert assessments on the question of whether and why educational institutions are particularly attractive targets for hackers. Educational institutions are increasingly under attack by cybercriminals. This finding seems to emerge at least from the headlines: For...

Security Essen 2022