top of page
BLOG



🧠🔐 LLMs in the security check: How AI helps – and at the same time becomes dangerous
LLMs boost IT security — but also create new attack surfaces. The OWASP report reveals where real risks are hiding.

Daniel Eberhorn
Apr 27


🧱 Single point of failure? – 🔍 Is another vulnerability database needed?
The National Vulnerability Database (NVD) is in crisis — delays and missing assessments are undermining global trust. With the launch of the EUVD, Europe introduces its own vulnerability platform. But is a second database truly needed, or are we risking fragmentation over security? This article explores the opportunities, challenges, and strategic relevance of digital sovereignty for Europe.

Daniel Eberhorn
Apr 20


🔎 Browsers as password managers under investigation: 🔐 Technical revolution or risky convenience? ⚠️
Browsers store passwords conveniently but pose risks – for critical accounts, dedicated password managers are the better choice.

Daniel Eberhorn
Apr 6


🚧 Air Gapped – Why the separation is often not one 🚧
Air-gapped systems: often just VLANs instead of real isolation. Why the term rarely delivers what it promises in practice.

Daniel Eberhorn
Mar 3


👥 The human factor in Cyber Security: vulnerability or untapped strength? 👥
Human error is a risk in cyber security. How policies can promote work reality and employee strengths.

Daniel Eberhorn
Feb 14


☁️🔒 Cloud firewalls in focus: How secure is the cloud? 🔒☁️
Native cloud firewalls provide basic protection, but additional measures are essential for comprehensive security.

Daniel Eberhorn
Jan 16


🔍🤖 AI in Cyber Security: Hype or Real Game Changer? 🤖🔍
AI in cyber security: Not a panacea, but a powerful tool – used correctly, it specifically complements human expertise.

Daniel Eberhorn
Jan 7


💳📱Apple Pay vs. Google Pay: Comparison of security for mobile payments 📱💳
Apple Pay vs. Google Pay in comparison: security, functions and differences of the mobile payment services at a glance.

Daniel Eberhorn
Dec 9, 2024


Cyber Threat Landscape 2025: 🔮 A look at the future of cyber security 🔮
Cyber Threat Landscape for 2025: A look at trends such as AI, quantum computing & increasing cyber attacks. Recognize risks & act!

Daniel Eberhorn
Dec 2, 2024


🚨 Goodbye to password changes? Why BSI and NIST are only partially right! 🚨
Goodbye to password changes? Why the new NIST and BSI recommendations are useful, but still not risk-free.

Daniel Eberhorn
Oct 8, 2024


🛡️ The attack surface of a company: Through the eyes of a hacker 🔍
Discover the importance of managing a company's attack surface to prevent cyberattacks and ensure robust security measures.

Daniel Eberhorn
Sep 27, 2024


⚙️ Authentication Reinvented: Passwordless in the Digital Future 🌍
Discover how passwordless and biometric authentication can transform enterprise security. Protect your data efficiently in the digital age.

Daniel Eberhorn
May 18, 2024


🎭👁️ From Illusion to Reality: The Dark Sides of Multi-Factor Authentication (MFA) 👁️🎭
Discover hidden MFA risks and strengthen your cybersecurity defenses.

Daniel Eberhorn
Apr 27, 2024


⚠️ Zip-Domains: Why They Were a Bad Idea ⚠️
Learn why .zip TLDs pose a security risk and how you can protect yourself.

Daniel Eberhorn
Apr 17, 2024


🛡️💼 'Tycoon' Malware Kit Bypasses Microsoft and Google MFA Protection 💼🛡️
Tycoon 2FA PhishKit: A Sophisticated Threat Bypassing Microsoft and Google MFA Protection.

Daniel Eberhorn
Apr 8, 2024


🔒 Ransomware Unveiled: How It Works, RaaS & Its Impact on Businesses 🚨
Discover all about ransomware: From how it works and RaaS to its impact and protection.

Daniel Eberhorn
Apr 2, 2024


🔒 Upgrade or take risks? Cybercrime doesn't wait! 🔒
In the world of cyber security, we often find ourselves on the edge of a constant challenge between development and the hackers.

Daniel Eberhorn
Mar 24, 2024
bottom of page