Blog
Hackers falsify your e-mail address
Hackers often use fake CEO emails to infiltrate corporate networks. If they have access to such emails, they can commit CEO fraud and infiltrate the network more easily. If a hacker tries to infiltrate a company's network...
Anti-phishing email policies in Microsoft Office 365
Admins can use Microsoft 365 Defender for Microsoft 365 to create policies to protect against phishing attacks. Special policies are used for this purpose, which can be created directly in the Microsoft 365 Admin Center. To create email policies in Microsoft 365...
Four times more ransomware cases due to attack on ERP
A new ERP Threat Report from Onapsis and Flashpoint highlights the evolution of the SAP threat landscape over the last four years. It shows the growing maturity of this cybercriminal market and the challenges faced by the defense side. Established,...
Implementation of NIS 2.0
Preventive security is of great importance, especially with regard to the NIS2 Directive and protection against cyber attacks. The NIS2 Directive was developed to strengthen the resilience of critical infrastructures and to establish uniform standards for...
Unpatchable security vulnerability in Apple M1 and M2 chip
There is currently an unpatchable hardware security vulnerability in Apple's M1 and M2 chips that could allow attackers to read a 2,048-bit key in under an hour, for example. There is currently a security vulnerability in Apple devices with M1 and...