What is an exploit?
๐ฉโ๐ Learn another security term this Wednesday: What is an exploit?
๐ฉโ๐ Learn another security term this Wednesday: What is an exploit?
The newly discovered xz-utils backdoor, which was published yesterday (NVD – CVE-2024-3094 (nist.gov)) also affects one of the Linux distributions most used by penetration testers: Kali Linux. โMake sure, that you are updating your Kali installations as fast as possible, especially when you updated them before in the time frame between 26.03.2024 and 29.03.2024. ๐กFor…
Start to annoy hackers today by using two-factor authentication (2FA)! Setting up 2-Step Verification (2SV) – NCSC.GOV.UK
In this post, I delve into the most relevant standards that secure our railway systems. Using Europe and Germany as a case study for the local and national level of standards, the following infographics provides a comprehensive overview of the most relevant standards helping to increase security on the tracks. ๐ Download infographics as pdf:…
The German BSI (Federal Office for Information Security) and TรV-Verband conducted a survey among German companies to assess the status of cybersecurity in the private sector. Some worrying results from my point of view are: ๐ Link to the study: BSI – Presse – TรV-Studie zur Cybersicherheit der deutschen Wirtschaft: Bedrohungslage steigt, Unternehmen wiegen sich…
Despite the Easter holidays, a lot of incredible work was done over the weekend by many researchers analysing the details of the xz-utils backdoor. Some examples are: As the situation unfolds, it is becoming clear that this was not just one of the most sophisticated technical (perhaps the most sophisticated) attempts to introduce a backdoor…
Maximilian Hedrich – Post | LinkedIn An example of what AI already is able to deliver today. We will need to deal with the issue of authenticity of voice and video in a AI driven future in a different way, than we did up to now. It’s not a question of “Will this technology be…