InfoGuard CSIrt Alert: kritische Sicherheitslücke in OpenSSH
Blog

[Alert] VUMA: RegreSSHion – Risk for exposed SSH Access

How a data protection incident reinforces the realisation that data protection is a must.
Blog

Identity protection – we can only protect what we're able to see

Leaked Credentials or how Black Basta attacker penetrate networks.
Blog

Leaked Credentials: How Black Basta attacker penetrate networks

Advent story: Gingerbread targeted by hackers (InfoGuard Cyber Security Blog)
Blog

[Advent Story] A Sweet Temptation: Hackers Train their Sights on Gingerbread

InfoGuard CSIRT: (New) Volume Business: Fully Automated Scan and Reasonable Ransom Amount (InfoGuard Cyber Security Blog)
Blog

(New) Volume Business: Fully Automated Scan and Reasonable Ransom Amount

Risk Management in Practice: Lessons from Diving for IT Security (Cyber Security Blog)
Blog

Risk Management in Practice: Lessons from Diving for IT Security

Cyber incidents: The biggest business risk worldwide (InfoGuard Cyber Security Blog)
Blog

Cyber Incidents as the Biggest Business Risk – How Prevention Should Look Like

Malware camouflage: threat through manipulated command lines (InfoGuard Cyber Security Blog)
Blog

Malware Cloaking: the Growing Threat of Manipulated Command Lines

InfoGuard Cyber Security Blog: The seven mortal sins - how hackers can easily compromise networks
Blog

The seven mortal sins: how hackers can easily compromise networks

infoguard-csirt-alert-cyber-security-blog-malvertising
Blog

[Alert] InfoGuard CSIRT issues a “malvertising” warning

infoguard-cyber-security-blog-rueckblick-2022-ausblick-2023-en
Blog

An exciting year for cyber security is both behind us and ahead of us

Blog

Advent, Advent, the school is “burning”! [Part 3]

infoguard-csirt-alert-cyber-security-blog-malware-raspberry-robin
Blog

[Alert] InfoGuard CSIRT issues a warning about infected flash drives

infoguard-advent-the-school-is-burning-cyber-security
Blog

Advent, Advent, the school is “burning”! [Part 1]

infoguard-understand-recognise-and-minimise-cyber-risks-in-supply-chains
Blog

Understanding, recognising and minimising supply chain cyber risk

infoguard-zugriffs-auf-authentisierungstokens-von-team-accounts-was-ist-dran
Blog

[Q&A] Access to authentication tokens from Teams accounts – What’s that all about?

Blog

Cyber defence demands expertise in cyber security, legal and risk transfer

Blog

How do I protect my Azure account?

Blog

InfoGuard CSIRT is warning of e-banking fraud

infoguard-cyber-security-business-continuity-management-bcm
Blog

Business Continuity Management (BCM) – being prepared starts with the mind

infoguard-blog-cyber-resilience-part2-en
Blog

Cyber Resilience: CSIRT insights and emergency plan for top management

infoguard-blog-cyber-resilience-en
Blog

Dealing with cyber risks is a matter for the top management

infoguard-cyber-security-evuma
Blog

External Vulnerability Management (eVUMA) – not optional, it’s a duty

infoguard-blog-identities
Blog

Identities are central to digitalisation and security

infoguard-cyber-security-blog-ddos-rekordjahr-2022-en
Blog

Why a new record number of DDoS attacks are predicted in 2022

infoguard-allianz-risk-barometer-2022
Blog

Cyber risks being ranked in first place in the Risk Barometer 2022 shows that they are still on the rise

infoguard-cybersecurity-blog-valentinstag-2.0-en
Blog

Valentine's Day 2.0 - how to date online with security

infoguard-cyber-security-adventskalender-2021-en
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 3]

infoguard-cyber-security-adventskalender-2021-en
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 2]

infoguard-stephan-berger-swiss-cyber-storm-2021-ransomware-part-2
Blog

Ransomware – a Latent Threat [Part 2]

infoguard-ransomware-stephan-berger-swiss-cyber-storm
Blog

Ransomware – a Latent Threat [Part 1]

infoguard-blog-azure-en
Blog

Dark clouds on the security horizon – Azure accounts compromised

infoguard-cyber-security-blog-healthcare-en
Blog

What you need to be aware of when it comes to cyber security in the healthcare sector

infoguard-blog-privilegied-access-cloud-en
Blog

Privileged access to the Cloud – this is how to avoid damage

infoguard-blog-why-backup-strategy
Blog

Why it’s so important to have a solid back-up strategy

Blog

Handle security incidents efficiently with Incident Response Triage

infoguard-blog-ot-security-safety
Blog

OT-Security, because it’s all about all of our safety and security

infoguard-blog-2fa-phishing-en
Blog

2-Factor-Phishing – the “Man-in-the-Middle” Attack

infoguard-blog-KI-cyberattacken-en
Blog

Fighting cyberattacks – AI both as a shield and a weapon

infoguard-cyber-security-supply-chain-risk-management
Blog

A triangular relationship that comes with risks – Supply Chain Risk Management

infoguard-cyber-security-blog-securitylounge-2021-en
Blog

InfoGuard Security Lounge 2021 – Cyber Security Livestream

infoguard-cyber-security-blog-stalkerware
Blog

Stalkerware – when the smartphone turns into a bugging device

infoguard-blog-risk-factor-byod-en
Blog

The BYOD risk factor – when business data goes mobile

infoguard-cyber-blog-vectra0365
Blog

Hackers and their target of choice – Microsoft 365 services

ig-blog-cyber-risk-monitoring-en
Blog

Cyber Risk Monitoring – keeping an eye on your cyber risks!

ig-blog-ransomware-parceltrick
Blog

[InfoGuard CSIRT Warning] Currently Ransomware Attacks are underway with the Parcel Trick

infoguard-blog-osterblog
Blog

The Easter Bunny as a Threat Actor – hunting for the tracks left behind

infoguard-blog-cyber-risk-management
Blog

Cyber Risk Management – how to keep your level of cyber risk under control!

microsoft-exchange-vulnerabilities–cleaning-tool-is-not-removing-all-footholds
Blog

Microsoft Exchange vulnerabilities – MS cleaning tool is not removing all adversaries footholds

infoguard-cyber-security-blog-ransomware-hacker
Blog

Ransomware attacks becoming more and more professional – and dangerous

infoguard-blog-online-education
Blog

Online Education – How Cyber Criminals Profit From It

infoguard-cyber-security-sql-injection
Blog

SQL injection – how hackers break into internal databases

infogaurd-blog-sophos-threat-report2021-en
Blog

A look forward into the Cyber Security New Year – Sophos Threat Report 2021

infoguard-blog-backup-and-recovery
Blog

Why you should be treating your company data as if it were precious crown jewels

infoguard-cyber-security-blog-ttx-en
Blog

Table-Top-Exercises (TTX) – think about the worst-case scenario

infoguard-blog-cyber-risk-monitoring-en
Blog

Cyber Risk Monitoring – why you should be monitoring your cyber risks

infoguard-psychology–the-underrated-force-in-cyber-security
Blog

Psychology – the underrated force in cyber security

infoguard-business-continuity-management-bcm-en
Blog

Business Continuity Management (BCM) – being prepared for global events

infoguard-cyber-security-qr-code-security-en
Blog

QR code – a little square that poses an underrated cyber risk

infoguard-cyber-security-blog-security-or-trust
Blog

Security or trust – which one comes first?

infoguard-cyber-security-healthcare-corona-en
Blog

Healthcare in the context of viruses and co.

infoguard-cyber-security-blog-secure-home-office-2
Blog

[Part 2] Home office? Yes, but do it “securely” – incl. a checklist

infoguard-cyber-security-blog-home-office
Blog

Home office? Why not, but do it “securely” with these 5 tips

infoguard-cyber-security-coronavirus
Blog

Red alert ‒ the hacking trick with Coronavirus

infoguard-CVE-2019-11184-en
Blog

CVE-2019-11184 – an Intel CPU vulnerability following 6 months of research

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 4]

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 3]

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 2]

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 1]

infoguard-cyber-security-threat-report-2020
Blog

A look into the cyber crystal ball – the Threat Report 2020

infoguard-cloud-penetration-testing
Blog

Cloud penetration testing – Find the holes in your cloud!

infoguard-cyber-security-blog-incident-response-video
Blog

[Video] Incident Response – the 5 most common mistakes

infoguard-cyber-security-blog-sap-security
Blog

SAP security ‒ security for standardised ERP software is possible [Part 2]

Blog

ERP ‒ the underestimated threat to your cyber security [Part 1]

infoguard-cyber-security-supply-chain-risk-management
Blog

How to build Cyber Supply Chain Risk Management

infoguard-cyber-security-blog-microsoft-rdp
Blog

Microsoft RDP – Another serious security vulnerability

infoguard-cyber-security-blog-emotet-trickbot-ryuk
Blog

Emotet, Trickbot and Ryuk – are these the worst threesome since computer viruses started?

phishing
Blog

Warning ‒ Targeted attacks on Swiss companies

infoguard-cyber-supply-chain-risk-management-sicherheit-lieferantenkette
Blog

Cyber Supply Chain Risk Management – Why security throughout the supply chain is so important

infoguard-cyber-security-zero-trust-architektur
Blog

Zero trust in cyber security – trust no-one!

infoguard-cyber-security-blog-reaktion-phishing
Blog

Phishing – why responsiveness is just as important as prevention

infoguard-cyber-security-whatsapp-sicherheitsluecke
Blog

WhatsApp, Mobile E-Banking & Co. – How to play it safe

infoguard-cyber-security-blog-whaling
Blog

Whaling – don't fall into cyber criminals clutches

infoguard-cyber-security-blog-emotet-dynamite-phishing
Blog

Dynamite Phishing ‒ Emotet can forge e-mails almost perfectly

Blog

The new Terabit era - are you ready for DDoS?

Blog

Endpoint Detection & Response – or why faster is better

Blog

Opportunity breeds thieves – what hackers and burglars have in common...

Blog

User and Entity Behaviour Analytics to the rescue, if the attacker is already in the system

Blog

Alexa, are you listening? 6 tips for the Secure use of language assistants

Blog

DDoS attacks under control? Not at all – this is just the tip of the iceberg

Blog

SOC 2.0 – or the miracle weapon against cyber threats

Blog

[Study] The future of apps, or how will your everyday life look like in year 2030

Blog

Cyber Risk Management ‒ a risk turns into an opportunity

Blog

What a Wasp has to do with the OWASP Top 10 Risks of Web applications

Blog

Social engineering emergency or how do hackers force their way into your mind

Blog

Phishing – do not fall into the cyber criminals net

Blog

Cyber security – how to reach the end of the day and stay secure

Blog

Machine Learning makes for a revolution in malware detection

Blog

What you missed at the DefCon 2017 – Part 2

Blog

Review of a visit to BSides and DefCon 2017 – Part 1

Blog

Our pentesters show how easy it is to hack IoT devices

Blog

These six measures will make exploits disappear...