M.Sc. Jan Hörnemann

Internet node Ruhr-CIX should bring the cloud servers to the Ruhrpott!

The largest Internet node in the world is located in Frankfurt. The umbrella company DE-CIX (Deutsche Commercial Internet Exchange) operates this node and has now decided to build a small version of the DE-CIX node within the Ruhr area with three providers from the Ruhr area. This small version is called Ruhr-CIX and could create new opportunities for many companies but also private persons from the Ruhr Area.

continue reading

WhatsApp failure due to unreadable message!

The popular Messenger WhatsApp is frequently featured in our blog posts. In today’s blog post, we discuss a WhatsApp failure that could cause the app to crash and require reinstallation. This WhatsApp vulnerability is worth mentioning because it can be triggered by an unreadable message. How this message looks like and how you can protect yourself from this attack is explained in this article.

continue reading

Pentest Tools #2 – gobuster

Penetration tests are one of the services offered by AWARE7 GmbH. We search for security holes in web applications or other systems and document them professionally. In our weekly blog series we present some tools that we use in most penetration tests. This week’s pentest tool #2 is gobuster.

continue reading

Cyber security in shipping – BSI warns!

Digitization affects almost all industries. This includes the entire shipping and logistics industry that goes hand in hand with it. A large and costly example of this is the ransomware wave from 2017, when cyber security was affected by the malware “NotPetya” from many logistics companies and shipping lines in the shipping industry, and lost many millions as a result. Now the German Federal Office for Information Security has published a guide on how to improve IT security in this industry.

continue reading

Protective measures in the year of the hackers – methods for your own protection!

2020 is a very exciting year so far from the perspective of IT security. Due to the Corona pandemic, many employees had to work in the home office, or still do. This partial rapid step towards the “remote office” has created many security gaps that can be exploited by attackers. We have looked at various protective measures against hackers to make your systems more secure. We look at the step before the attack up to the reactive measures when an attack is in full swing.

continue reading

Pentest-Tools #1 – dirbuster

Eine der Kernkompetenzen der AWARE7 GmbH sind die Penetrationstests. In diesen Tests geht es darum Sicherheitslücken in bspw. Web Applikationen zu finden. Bei solchen Tests werden diverse Pentest-Tools verwendet um Sicherheitslücken oder andere Schwachstellen zu finden. In unserer neuen Blog-Reihe werden wir wöchentlich ein Tool vorstellen, mit dem wir in unseren Pentest arbeiten. Unser Pentest-Tool #1 ist dirbuster.

continue reading

Apple certified known malware!

Actually, the purpose of Apple’s notarization service is to protect Mac users from malware. But now it has become known that exactly this notarization service has certified software that contained the well-known malware “Shlayer”.

continue reading

Trust Model or the Zero Trust Model – How should IT security be provided?

Due to the current effects of the COVID19 pandemic, many people are now thinking more about control. This partially awakened loss of control is not only in the health care system, but in many areas of society. This also includes IT systems, because especially the increasing home office creates new dangers that attackers can shamelessly exploit. In order to guarantee security we need models, and here there are two main opponents, the trust or zero trust model!

continue reading