2FA phishing
A new hashtag#attack technique on the rise: 2FA phishing.
Learn how it works: How do attackers try to get around multi-factor authentication?

A new hashtag#attack technique on the rise: 2FA phishing.
Learn how it works: How do attackers try to get around multi-factor authentication?

๐ธ How good are you at recognising AI-generated people? โ Would you be sceptical if the person tried to connect with you on LinkedIn, for example? You can test yourself on these two sites: ๐ Which Face Is Real?๐ thispersondoesnotexist.com
Despite the Easter holidays, a lot of incredible work was done over the weekend by many researchers analysing the details of the xz-utils backdoor. Some examples are: As the situation unfolds, it is becoming clear that this was not just one of the most sophisticated technical (perhaps the most sophisticated) attempts to introduce a backdoor…
Enjoy the Easter weekend!If you haven’t done yet, this weekend could be an opportunity to update your passwords / authentication methods. Remember those 3 basic measures:
Christmas season is here again! Like you, your “favorite” cyber criminals are also waiting to get their presents. Here are my 3 free security tips for you to spoil their fun this Christmas season: Have a wonderful time with your beloved ones and stay secure!
Cables for GSM-R were intentionally cut this morning in northern Germany. This is a very serious incident and has to be carefully investigated with regard to the motivation of the attackers. Link to article of German newspaper “Die Zeit” (08.10.2022)
The newly discovered xz-utils backdoor, which was published yesterday (NVD – CVE-2024-3094 (nist.gov)) also affects one of the Linux distributions most used by penetration testers: Kali Linux. โMake sure, that you are updating your Kali installations as fast as possible, especially when you updated them before in the time frame between 26.03.2024 and 29.03.2024. ๐กFor…