Actively utilized Enterprise CVEs: Focus of the last 7 days

Threat Intel update of the last 7 days: actively exploited vulnerabilities with CVSS ≥ 8 in Roundcube, Dell [...]

Active Enterprise Vulnerabilities of the Week

Analysis of the most important IT security developments of the last 7 days: actively exploited vulnerabilities with CVSS ≥ 8, [...]

Actively utilized high-severity CVEs: Microsoft & SolarWinds

Currently actively exploited vulnerabilities (CVSS>=8) in Microsoft Windows/ConfigMgr and SolarWinds Web Help Desk - with [...]

Ivanti EPMM: CVE-2026-1281/1340 actively exploited

Ivanti EPMM is affected by critical Pre-Auth RCEs (CVE-2026-1281/1340; CVSS 9.8). At least CVE-2026-1281 is active [...]

Cybersecurity in the home office

The relocation of data and work processes brings new security risks for cybersecurity in the home office [...]

IT departments at the limit: constant alarms, pressure and monotony cause dissatisfaction

IT departments are the backbone of many companies - but how well are the people behind [...]

Managing director liability for cyber attacks: What management needs to know

AI can offer enormous advantages for cybersecurity. But its use also raises ethical concerns and [...]

GDPR and cybersecurity: a close connection

Why GDPR and cybersecurity must be considered together. Avoid penalties and loss of image due to criminal [...]

Cloud security: risks and measures

Cloud security. What are the risks and measures of a successful cybersecurity strategy for your cloud.

Identity & Access Management: The pillar of modern IT security

Identity & Access Management (IAM) defines and manages roles and access rights of network users for [...]

Cyber attack on Wertach clinics: a wake-up call for the healthcare sector

After a hacker attack hit the Wertach clinics in Bobingen and Schwabmünchen, the exact extent [...]

DDoS overtakes ransomware as the most active cyber threat in Europe

DDoS overtakes ransomware as the most active cyber threat in Europe

AI in cybersecurity: friend or foe?

AI can offer enormous advantages for cybersecurity. But its use also raises ethical concerns and [...]

Security awareness: A key to IT security

Security awareness is intended to sensitize employees to IT security issues and impart the necessary knowledge.

Kaspersky Warning 2024: Between bans and alternatives

More about Kaspersky Warning 2024: Is Kaspersky still safe? What the BSI, USA and other countries say [...]

Zero-day attacks: protection against the invisible?

What is a zero day attack? We show what is behind it and how a [...]

Cyber insurance: Guide to better protection and lower premiums

Protect your business with cyber insurance for companies: Protection against cyber attacks and IT failures.

KRITIS: What is it and why is it important?

What is KRITIS? Here is a KRITIS definition. Find out what measures are needed to secure critical infrastructures [...].

Let's start a conversation.

Get in touch with us today. No matter what challenges you are facing: Take the next step towards optimizing your cybersecurity now.