2FA phishing
A new hashtag#attack technique on the rise: 2FA phishing.
Learn how it works: How do attackers try to get around multi-factor authentication?

A new hashtag#attack technique on the rise: 2FA phishing.
Learn how it works: How do attackers try to get around multi-factor authentication?

Are the bad guys using AI? They might! AI tools like ChatGPT or DALL-E-2 are currently widely tested out on the internet – both for the good as well as for the bad. From my point of view, we are at the very beginning of an interesting development, which will unfold over the next couple…
As with any new technology, the “other side” is trying to figure out how to use it to their advantage. The normal commercial versions of LLMs have barriers built in to prevent the creation of malware code or phishing mails, for example. If you remove these barriers, you get the output that we as security…
Maximilian Hedrich – Post | LinkedIn An example of what AI already is able to deliver today. We will need to deal with the issue of authenticity of voice and video in a AI driven future in a different way, than we did up to now. It’s not a question of “Will this technology be…
There is a job advert for a Windows 3.11 administrator role in the rail industry doing the rounds on the internet right now – e.g. here at Heise. It’s often accompanied by the question why such old systems are still in use – it’s 2024! Yes, this is the reality of OT systems – not…
What’s the state of your password security? Do you consider the length and complexity and don’t use the same password for multiple services? Post | LinkedIn
Despite the Easter holidays, a lot of incredible work was done over the weekend by many researchers analysing the details of the xz-utils backdoor. Some examples are: As the situation unfolds, it is becoming clear that this was not just one of the most sophisticated technical (perhaps the most sophisticated) attempts to introduce a backdoor…