Cybersecurity incident at T-Mobile US affects millions of customers

19.08.2021 CybersecurityIncident at T-Mobile US affects millions of customers In an attack on T-Mobile US, data of at least 40 million customers was stolen. We get to the heart of what exactly happened and what you can do yourself. What happened? On August 16, Deutsche Telekom’s subsidiary T-Mobile US announced that it had been the […]

Synology NAS Devices Are Attacked with StealthWorker Botnet – Password Security as Protection

13.08.2021 Synology NAS Devices Are Attacked with StealthWorker Botnet – Password Security as Protection With the help of a botnet (networking of several computer programs that automatically and independently perform certain tasks), Synology NAS devices are currently being attacked. It tries to guess passwords and install malware. Password security is crucial in this attack. What […]

Serious vulnerabilities in Android

05.08.2021 Serious vulnerabilities in Android Last Monday, Android informed about vulnerabilities in the software and provided the associated security updates. What happened? On August 02, Android announced the release of security updates for several vulnerabilities in its system. The German authority BSI classified these vulnerabilities as “particularly serious”. The information was published as part of […]

Zero-Click Attacks – No Click to Victim

The cyber risk is constantly increasing. Cyberattacks are now so sophisticated that users become victims without having taken action themselves or having made a mistake.

Cybersecurity on vacation

Smartphones, tablets and laptops are often part of today’s holiday luggage. Cybercriminals also know this and like to exploit it. So make sure you take care of your cybersecurity on the go – with our tips!

Bring Your Own Device (BYOD) – Private Devices in Professional Use

For many IT devices, there is no clear separation between professional and private life. Work e-mails are quickly checked on the private smartphone. The big presentation moves from the office to home on the USB stick and back again revised. In the home office due to the pandemic, the private laptop replaces the company’s own desktop computer.

Ransomware spread using Kaseya-VSA

05.07.2021 Ransomware spread using Kaseya-VSA On Friday, July 2, it was announced that some VSA servers of the security software provider Kaseya had spread ransomware via a hijacked software update. Kaseya has already informed about the potential attack on its VSA software and has already shut down the cloud-based version for this reason. Despite the […]

The “Silent Cyber” Risk – Silence Is Not Always Gold

Silent cyber describes a “silent” or a so-called non-affirmative cyber risk. This means that coverage for damage incurred as a result of a cyber attack is not explicitly included or excluded in insurance policies. So it will be silent about it. This can be problematic in the event of damage.