No data leak: Login warnings from the password manager LastPass

03.01.2022 No data leak: Login warnings from the password manager LastPass Users of the password management software LastPass reported last week that they received emails from the company about unauthorized login attempts using their individual master password. LastPass took a stand on what happened and assured that no user information had been shared with third […]

Ransomware ransom: To pay or not to pay, that is the question.

Ransom demands after a successful ransomware attack are a sensitive topic. The sum demanded can be very high. Just like the pressure to pay them. But there is no guarantee that you will get your data back. You may even be liable to prosecution by paying. In addition, every payment makes the ransomware business model even more profitable and thus worsens the overall situation. But without data and usable IT, everything in your company has been at a standstill for days and the costs …!

Emotet is back: The malware declared defeated is back on the move

22.11.2021 Emotet is back: The malware declared defeated is back on the move The malware Emotet, which was thought to have been defeated at the beginning of the year, is back in circulation. We have summarized the most important questions and answers about the return of Emotet for you and get to the heart of […]

Zero-day vulnerabilities discovered at Microsoft again

10.11.2021 Zero-day vulnerabilities discovered at Microsoft again Due to zero-day security vulnerabilities for Microsoft Exchance Server, among others, there is a threat of a new wave of attacks on unpatched Microsoft Exchange servers. Below you will find further background information and information on how to deal with the attack. What happened? On November 9, 2021, […]

How to better protect yourself from malware from Office documents

85% of all German companies use Microsoft Office as their office software of choice. Many documents are also created, edited and shared privately with Word & Co. But cybercriminals also like to use Office programs – to spread malware. We’ll tell you how you can better protect yourself against it.

Vulnerability makes Google Chrome and Microsoft Edge vulnerable – fix it now

27.09.2021 Vulnerability makes Google Chrome and Microsoft Edge vulnerable – fix it now Due to a security vulnerability, both Google Chrome and Microsoft Edge could become the target for cyberattacks. We get to the heart of what exactly happened and how you can best protect yourself from it. What happened? In a post on September […]

Attack on democracy – cybercriminals and elections

Hacked servers, leaked emails, millions of fabricated social media content and attacks on voting computers – these are the digital ways in which attempts were made to influence the last two US elections from the outside. In the run-up to the Bundestag elections, the question also arises in Germany: Can cybercriminals manipulate our elections? And if so, how? What are their strategies? And who can protect themselves and how? We give a small overview here.

Smishing: data theft in the event of a message!

Phishing attacks are becoming more targeted – and sophisticated! More and more criminals are targeting mobile users by sending malicious content via SMS. What this is all about and how you can best protect yourself against it – just read on.