BLOG
Prevention alone is not enough: 🔑 The central role of preparation in cyber resilience 🛡️
💠🔗 Quantum computing and encryption: How secure will encryption be tomorrow? 🔗💠
💳📱Apple Pay vs. Google Pay: Comparison of security for mobile payments 📱💳
Cyber Threat Landscape 2025: 🔮 A look at the future of cyber security 🔮
🦖💻 Cyber relics: Why vulnerability scanners should end up in a museum 💻🦖
🕵️♀️💻 When attackers pose as IT support: next-generation social engineering 🕵️♀️💻
🚨 Goodbye to password changes? Why BSI and NIST are only partially right! 🚨
🛡️ The attack surface of a company: Through the eyes of a hacker 🔍
🔐 ❌ No more 8 characters: Passwords are changing and why 8 characters are no longer enough 🔐
⚙️ Authentication Reinvented: Passwordless in the Digital Future 🌍
🎭👁️ From Illusion to Reality: The Dark Sides of Multi-Factor Authentication (MFA) 👁️🎭
⚠️ Zip-Domains: Why They Were a Bad Idea ⚠️
🛡️💼 'Tycoon' Malware Kit Bypasses Microsoft and Google MFA Protection 💼🛡️
🔒 Ransomware Unveiled: How It Works, RaaS & Its Impact on Businesses 🚨
🔧Debian 11 Upgrade - Update from Debian 10 to Debian 11🔧
🔧Debian 12 Upgrade - Update from Debian 11 to Debian 12🔧
⏰ Safely in sync: The importance and security of NTP in cyber security ⏰
🔒 Upgrade or take risks? Cybercrime doesn't wait! 🔒