Leaked Credentials or how Black Basta attacker penetrate networks.
Blog

Leaked Credentials: How Black Basta attacker penetrate networks

Risk Management in Practice: Lessons from Diving for IT Security (Cyber Security Blog)
Blog

Risk Management in Practice: Lessons from Diving for IT Security

Cyber incidents: The biggest business risk worldwide (InfoGuard Cyber Security Blog)
Blog

Cyber Incidents as the Biggest Business Risk – How Prevention Should Look Like

Malware camouflage: threat through manipulated command lines (InfoGuard Cyber Security Blog)
Blog

Malware Cloaking: the Growing Threat of Manipulated Command Lines

InfoGuard Cyber Security Blog: The seven mortal sins - how hackers can easily compromise networks
Blog

The seven mortal sins: how hackers can easily compromise networks

infoguard-csirt-alert-cyber-security-blog-malvertising
Blog

[Alert] InfoGuard CSIRT issues a “malvertising” warning

infoguard-cyber-security-blog-rueckblick-2022-ausblick-2023-en
Blog

An exciting year for cyber security is both behind us and ahead of us

Blog

Advent, Advent, the school is “burning”! [Part 3]

infoguard-csirt-alert-cyber-security-blog-malware-raspberry-robin
Blog

[Alert] InfoGuard CSIRT issues a warning about infected flash drives

infoguard-advent-the-school-is-burning-cyber-security
Blog

Advent, Advent, the school is “burning”! [Part 1]

infoguard-understand-recognise-and-minimise-cyber-risks-in-supply-chains
Blog

Understanding, recognising and minimising supply chain cyber risk

infoguard-zugriffs-auf-authentisierungstokens-von-team-accounts-was-ist-dran
Blog

[Q&A] Access to authentication tokens from Teams accounts – What’s that all about?

Blog

Cyber defence demands expertise in cyber security, legal and risk transfer

Blog

How do I protect my Azure account?

Blog

InfoGuard CSIRT is warning of e-banking fraud

infoguard-cyber-security-business-continuity-management-bcm
Blog

Business Continuity Management (BCM) – being prepared starts with the mind

infoguard-blog-cyber-resilience-part2-en
Blog

Cyber Resilience: CSIRT insights and emergency plan for top management

infoguard-blog-cyber-resilience-en
Blog

Dealing with cyber risks is a matter for the top management

infoguard-cyber-security-evuma
Blog

External Vulnerability Management (eVUMA) – not optional, it’s a duty

infoguard-blog-identities
Blog

Identities are central to digitalisation and security

infoguard-cyber-security-blog-ddos-rekordjahr-2022-en
Blog

Why a new record number of DDoS attacks are predicted in 2022

infoguard-allianz-risk-barometer-2022
Blog

Cyber risks being ranked in first place in the Risk Barometer 2022 shows that they are still on the rise

infoguard-cybersecurity-blog-valentinstag-2.0-en
Blog

Valentine's Day 2.0 - how to date online with security

infoguard-cyber-security-adventskalender-2021-en
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 3]

infoguard-cyber-security-adventskalender-2021-en
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 2]

infoguard-stephan-berger-swiss-cyber-storm-2021-ransomware-part-2
Blog

Ransomware – a Latent Threat [Part 2]

infoguard-ransomware-stephan-berger-swiss-cyber-storm
Blog

Ransomware – a Latent Threat [Part 1]

infoguard-blog-azure-en
Blog

Dark clouds on the security horizon – Azure accounts compromised

infoguard-cyber-security-blog-healthcare-en
Blog

What you need to be aware of when it comes to cyber security in the healthcare sector

infoguard-blog-why-backup-strategy
Blog

Why it’s so important to have a solid back-up strategy

Blog

Handle security incidents efficiently with Incident Response Triage

infoguard-blog-2fa-phishing-en
Blog

2-Factor-Phishing – the “Man-in-the-Middle” Attack

infoguard-blog-KI-cyberattacken-en
Blog

Fighting cyberattacks – AI both as a shield and a weapon

infoguard-cyber-security-supply-chain-risk-management
Blog

A triangular relationship that comes with risks – Supply Chain Risk Management

infoguard-cyber-security-blog-securitylounge-2021-en
Blog

InfoGuard Security Lounge 2021 – Cyber Security Livestream

infoguard-cyber-security-blog-stalkerware
Blog

Stalkerware – when the smartphone turns into a bugging device

infoguard-blog-risk-factor-byod-en
Blog

The BYOD risk factor – when business data goes mobile

ig-blog-cyber-risk-monitoring-en
Blog

Cyber Risk Monitoring – keeping an eye on your cyber risks!

ig-blog-ransomware-parceltrick
Blog

[InfoGuard CSIRT Warning] Currently Ransomware Attacks are underway with the Parcel Trick

infoguard-blog-osterblog
Blog

The Easter Bunny as a Threat Actor – hunting for the tracks left behind

infoguard-blog-cyber-risk-management
Blog

Cyber Risk Management – how to keep your level of cyber risk under control!

microsoft-exchange-vulnerabilities–cleaning-tool-is-not-removing-all-footholds
Blog

Microsoft Exchange vulnerabilities – MS cleaning tool is not removing all adversaries footholds

infoguard-cyber-security-blog-ransomware-hacker
Blog

Ransomware attacks becoming more and more professional – and dangerous

infoguard-blog-online-education
Blog

Online Education – How Cyber Criminals Profit From It

infoguard-cyber-security-sql-injection
Blog

SQL injection – how hackers break into internal databases

infogaurd-blog-sophos-threat-report2021-en
Blog

A look forward into the Cyber Security New Year – Sophos Threat Report 2021

infoguard-blog-backup-and-recovery
Blog

Why you should be treating your company data as if it were precious crown jewels

infoguard-cyber-security-blog-ttx-en
Blog

Table-Top-Exercises (TTX) – think about the worst-case scenario

infoguard-blog-cyber-risk-monitoring-en
Blog

Cyber Risk Monitoring – why you should be monitoring your cyber risks

infoguard-psychology–the-underrated-force-in-cyber-security
Blog

Psychology – the underrated force in cyber security

infoguard-business-continuity-management-bcm-en
Blog

Business Continuity Management (BCM) – being prepared for global events

infoguard-cyber-security-qr-code-security-en
Blog

QR code – a little square that poses an underrated cyber risk

infoguard-cyber-security-blog-security-or-trust
Blog

Security or trust – which one comes first?

infoguard-cyber-security-healthcare-corona-en
Blog

Healthcare in the context of viruses and co.

infoguard-cyber-security-blog-secure-home-office-2
Blog

[Part 2] Home office? Yes, but do it “securely” – incl. a checklist

infoguard-cyber-security-blog-home-office
Blog

Home office? Why not, but do it “securely” with these 5 tips

infoguard-cyber-security-coronavirus
Blog

Red alert ‒ the hacking trick with Coronavirus

infoguard-CVE-2019-11184-en
Blog

CVE-2019-11184 – an Intel CPU vulnerability following 6 months of research

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 4]

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 3]

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 2]

infoguard-cyber-security-hacker-adventskalender-19
Blog

A gift, you wouldn't wish even on your worst enemy [Part 1]

infoguard-cyber-security-threat-report-2020
Blog

A look into the cyber crystal ball – the Threat Report 2020

infoguard-cyber-security-blog-incident-response-video
Blog

[Video] Incident Response – the 5 most common mistakes

infoguard-cyber-security-blog-sap-security
Blog

SAP security ‒ security for standardised ERP software is possible [Part 2]

Blog

ERP ‒ the underestimated threat to your cyber security [Part 1]

infoguard-cyber-security-supply-chain-risk-management
Blog

How to build Cyber Supply Chain Risk Management

infoguard-cyber-security-blog-microsoft-rdp
Blog

Microsoft RDP – Another serious security vulnerability

infoguard-cyber-security-blog-emotet-trickbot-ryuk
Blog

Emotet, Trickbot and Ryuk – are these the worst threesome since computer viruses started?

phishing
Blog

Warning ‒ Targeted attacks on Swiss companies

infoguard-cyber-supply-chain-risk-management-sicherheit-lieferantenkette
Blog

Cyber Supply Chain Risk Management – Why security throughout the supply chain is so important

infoguard-cyber-security-blog-reaktion-phishing
Blog

Phishing – why responsiveness is just as important as prevention

infoguard-cyber-security-whatsapp-sicherheitsluecke
Blog

WhatsApp, Mobile E-Banking & Co. – How to play it safe

infoguard-cyber-security-blog-whaling
Blog

Whaling – don't fall into cyber criminals clutches

infoguard-cyber-security-blog-emotet-dynamite-phishing
Blog

Dynamite Phishing ‒ Emotet can forge e-mails almost perfectly

Blog

The new Terabit era - are you ready for DDoS?

Blog

Endpoint Detection & Response – or why faster is better

Blog

Opportunity breeds thieves – what hackers and burglars have in common...

Blog

User and Entity Behaviour Analytics to the rescue, if the attacker is already in the system

Blog

DDoS attacks under control? Not at all – this is just the tip of the iceberg

Blog

SOC 2.0 – or the miracle weapon against cyber threats

Blog

[Study] The future of apps, or how will your everyday life look like in year 2030

Blog

Cyber Risk Management ‒ a risk turns into an opportunity

Blog

What a Wasp has to do with the OWASP Top 10 Risks of Web applications

Blog

Social engineering emergency or how do hackers force their way into your mind

Blog

Phishing – do not fall into the cyber criminals net

Blog

Cyber security – how to reach the end of the day and stay secure

Blog

Machine Learning makes for a revolution in malware detection

Blog

What you missed at the DefCon 2017 – Part 2

Blog

Review of a visit to BSides and DefCon 2017 – Part 1

Blog

These six measures will make exploits disappear...