Warning about new ransomware tactics: How to protect yourself!

Recently, organizations have been confronted with a new ransomware method that is particularly sophisticated. It’s important to be aware of this tactic to protect yourself and your organization. Here are the details and specific recommendations for action: The new scam Attackers use a multi-stage method: Two important findings:

Mastering Security: How do I set up an Nginx reverse proxy?

As already explained in our article on proxies, there are many reasons for using a reverse proxy. But how do I set up such a reverse proxy? This blog post shows how to set up an Nginx reverse proxy, using an Apache web server on its own domain as an example. These instructions apply to […]

Visit us at the IT security trade fair ITSA – Stand 6-246

We have exciting news for you! We will be at the IT security trade fair ITSA this year and would be delighted to welcome you to our stand 6-246 from October 22 to 24, 2024. There we will show you the latest developments and solutions in the field of IT security. ITSA is one of […]

MCTTP

MCTTP 2024 Review The MCTTP – MUNICH CYBER TACTICS, TECHNIQUES AND PROCEDURES 2024 took place last week (17.09-19.09.2024) at Motorworld in Munich. Once again, numerous speakers applied for the coveted slots at the conference and only the best were selected. Speakers were flown in from all over the world, including countries such as America, Pakistan, […]

MCTTP 2024

internationally renowned speakers exclusive insider information professional quality in 2 tracks CISOs & IT experts the creation of an outstanding network BE THERE! -300€ with the exclusive code: CSRT-FH-243 https://mcttp.de Fact- Cyber attacks are increasing daily, the wave of cyber terrorism is growing unstoppably. Ignoring these threats is not an option. The ever-increasing complexity of […]

Hacker target: WordPress

As the world’s most popular content management system (CMS), WordPress is a prime target for hackers. The security of WordPress websites is therefore key to avoiding the following direct consequences: Cleaning up these issues is time-consuming and costly.Important! Proactive measures and security best practices can significantly reduce the risk of security incidents.In this blog post, […]

The safety of our children

Why Munich schools are becoming a target for hackers IT security in many primary and secondary schools in Munich is inadequate. The Bavarian Teachers’ Association is pushing for improved equipment, while the City of Munich is working on a changeover. Problem with the outdated web mail application The web mail application Horde, which is used […]

Mastering Security: Wie nutze ich Vaultwarden?

In einem unserer letzten Blogposts haben wir bereits vorgestellt, wie man die Open Source Version des bekannten Passwortmanagers Bitwarden installiert. In dem heutigen Beitrag erklären wir nun, wie man diesen verwendet. Die folgenden Begriffe werden dabei häufiger genannt werden: 1.1      Erstellung eines neuen Passworts Wenn wir ein neues Passwort speichern wollen oder ein neues Passwort […]