top of page
BLOG



Daniel Eberhorn
Nov 7, 2024
🕵️♀️💻 When attackers pose as IT support: next-generation social engineering 🕵️♀️💻
Cybercriminals are using Microsoft Teams for sophisticated social engineering attacks. Find out how companies can protect themselves.


Daniel Eberhorn
Oct 8, 2024
🚨 Goodbye to password changes? Why BSI and NIST are only partially right! 🚨
Goodbye to password changes? Why the new NIST and BSI recommendations are useful, but still not risk-free.


Daniel Eberhorn
May 18, 2024
⚙️ Authentication Reinvented: Passwordless in the Digital Future 🌍
Discover how passwordless and biometric authentication can transform enterprise security. Protect your data efficiently in the digital age.


Daniel Eberhorn
Apr 27, 2024
🎭👁️ From Illusion to Reality: The Dark Sides of Multi-Factor Authentication (MFA) 👁️🎭
Discover hidden MFA risks and strengthen your cybersecurity defenses.


Daniel Eberhorn
Apr 8, 2024
🛡️💼 'Tycoon' Malware Kit Bypasses Microsoft and Google MFA Protection 💼🛡️
Tycoon 2FA PhishKit: A Sophisticated Threat Bypassing Microsoft and Google MFA Protection.
bottom of page