ECDU.EU AI DEVELOPMENT
by b0e77y

Stay up to date with our tips and articles on IT security and take a look behind the scenes of cybercrime and artificial intelligence.

Knowledge Base

Eigenverantwortung und Cybersicherheit: Reflexionen im Angesicht des Hackerangriffs auf Motel-One

Personal responsibility and cybersecurity: Refl...

At the end of September 2023, the Motel-One hotel chain was the target of a serious hacker attack in which, according to public information, more than 6 terabytes of customer...

Personal responsibility and cybersecurity: Refl...

At the end of September 2023, the Motel-One hotel chain was the target of a serious hacker attack in which, according to public information, more than 6 terabytes of customer...

Was ist Pentesting?

What is Pentesting?

"Pentesting" stands for "penetration testing" and describes the process in which computer systems, networks or applications are checked for security gaps. This involves trying to act like an attacker to...

What is Pentesting?

"Pentesting" stands for "penetration testing" and describes the process in which computer systems, networks or applications are checked for security gaps. This involves trying to act like an attacker to...

Redteaming - Stärkung der Cybersicherheit für Unternehmen

Redteaming - strengthening cybersecurity for co...

In the cybersecurity arena, “redteaming” is not just another buzzword. It's an advanced method that organizations use to really test their defenses. While penetration testing reveals vulnerabilities in systems, redteaming...

Redteaming - strengthening cybersecurity for co...

In the cybersecurity arena, “redteaming” is not just another buzzword. It's an advanced method that organizations use to really test their defenses. While penetration testing reveals vulnerabilities in systems, redteaming...

APT - Komplexe Angriffe auf Unternehmen

APT - Complex attacks on companies

An Advanced Persistent Threat (APT) is a complex form of cyber attack in which an attacker seeks persistent access to a network or system and attempts to remain undetected. These...

APT - Complex attacks on companies

An Advanced Persistent Threat (APT) is a complex form of cyber attack in which an attacker seeks persistent access to a network or system and attempts to remain undetected. These...

Was ist Endpoint Security?

What is Endpoint Security?

What is Endpoint Security? Endpoint Security is a security solution that protects endpoint devices such as laptops, desktops, smartphones and tablets from malware, data theft and other threats. Endpoint security...

What is Endpoint Security?

What is Endpoint Security? Endpoint Security is a security solution that protects endpoint devices such as laptops, desktops, smartphones and tablets from malware, data theft and other threats. Endpoint security...

Phishing Mail erhalten - was tun?

Received a phishing email - what to do?

We've put together a simple step-by-step guide on what to do if you've received a phishing email Don't panic: it's important to stay calm. Simply receiving a phishing email is...

Received a phishing email - what to do?

We've put together a simple step-by-step guide on what to do if you've received a phishing email Don't panic: it's important to stay calm. Simply receiving a phishing email is...