Attack on GSM-R
Cables for GSM-R were intentionally cut this morning in northern Germany. This is a very serious incident and has to be carefully investigated with regard to the motivation of the attackers.
Cables for GSM-R were intentionally cut this morning in northern Germany. This is a very serious incident and has to be carefully investigated with regard to the motivation of the attackers.
Voice and video as a means of identification can no longer be considered as secure! Let me predict, that the threat of impersonation through deepfakes and AI generated content will be one of the next big things. They will be used for fraudulent activities or for attempts to manipulate the public opinion. We need new…
Happy new railway year from the new line between Stuttgart and Ulm! I’ve been waiting for this moment for years! Yesterday was the first day with the new timetable – therefore all railroaders celebrate a “happy new railway year”! I’ve used the chance yesterday to travel on the new line between Stuttgart and Ulm, were…
A big “Thank you” to all participants for attending the German edition of our ICS – Informatik Consulting Systems webinar today! I’m very happy, that so many people were interested in the topic “Security lifecycle management for existing ETCS products”. 📣 In case you’ve missed it or you’re not speaking German – don’t worry! There…
This post is a great example, that a spear phishing attack also works in the offline world. It does not always have to be an e-mail! Thank you to Marc Torke for sharing this. The letter in the picture is claiming to come from an official German court and was sent to a newly founded…
There was an interesting article published about Bing’s AI chat bot using a LLM (Large Language Model) this weekend in the New York Times. A clear recommendation for reading:Why a Conversation With Bing’s Chatbot Left Me Deeply Unsettled – The New York Times
A new hashtag#attack technique on the rise: 2FA phishing.Learn how it works: How do attackers try to get around multi-factor authentication? https://www.microsoft.com/en-us/security/blog/2022/07/12/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud