IT-Security Blog

Read over 500 free articles about hacking, malware and scams on the Internet.

Pentest as a service - aware7

What is Pentest as a Service?

Pentest as a Service can be relevant for anyone who is continuously striving to have their infrastructure and applications examined for IT security. Progressive digitization brings with it many advantages. Companies can work faster and more flexibly, as well as react more flexibly to changes. But digital networking and the … continue reading

Was ist eine Phishing Simulation

What is a phishing simulation?

Running a phishing simulation is a topic that is often underestimated. At first listen, it sounds like a video game for anglers, but it protects companies from compromise. Since we offer a phishing simulation as a service and have customers who ask about this again and again, we would like … continue reading

Windows Active Directory Hardening - 7 Tipps

Active Directory: Secure the gateway

Active Directory is a network service used in a Windows domain. It is used to manage user and computer accounts and groups in a domain. In addition, other information such as services, network devices and network services can also be stored in an Active Directory domain. Active Directory is a … continue reading

phishing-4-0

Phishing 4.0: New level through AI

Phishing is still on everyone’s lips, and the threat landscape has changed for a number of reasons. Phishing is a type of digital attack that uses fraudulent emails or websites to trick users into revealing personal information such as passwords or credit card numbers. Phishing attacks are often difficult to … continue reading