As a globally leading manufacturer of industrial radio control systems, HBC-radiomatic has firmly embedded security awareness into its corporate culture. In this interview, Soenke Knipp, Head of IT at HBC-radiomatic, explains why the long-established company from Crailsheim in Baden-Württemberg chose…
Category: Security Blog G Data Software AG
NIS-2 in Practice: How a Managed SOC Supports Compliance with Regulatory Requirements
Implementing the requirements of the NIS 2 Directive involves more than just introducing new tools: it requires effective processes, continuous monitoring of IT systems, and specialized IT security expertise. This is precisely where the challenge lies for many companies. A…
Fake Document, Real Access: Foxit Impersonation Enables Stealth VNC Control
Attackers who impersonate trusted vendors do not only damage the reputation of the original vendor, but also cause heaps of trouble down the line. This article has been indexed from Security Blog G Data Software AG Read the original article:…
Claude Mythos: Dangers and rewards, right next to each other
A lot has already been written about Anthropic’s “Mythos.” While some welcome it and embrace the new possibilities, others are heralding the end of cybersecurity. The truth lies somewhere in between. This article has been indexed from Security Blog G…
“Implementing NIS-2 is an organizational stress test”
Many companies still do not fully have NIS-2 on their radar. Yet it is no longer just about a registration requirement. In this interview, Dr. Matthias Zuchowski, regulatory expert at G DATA CyberDefense, explains what companies need to do now,…
“Pics or it didnt happen” – What BlueHammer tells us about Vulnerability Disclosure
Last week, reports circulated about an unpatched security vulnerability in Microsoft Windows. The “BlueHammer” 0-day vulnerability allows a normal user to gain system-level privileges. Microsoft allegedly refused to accept a report about the vulnerability—because video proof was missing. This article…
Security Awareness: Why employees are essential for IT security
Technical protection measures are only half the battle. In this interview, Frank Queißer from Cyber Samurai explains why security awareness is a crucial component of modern IT security, how companies can identify knowledge gaps among employees, and why realistic training…
Phishing SMS: How to Recognize Fraudulent Messages and Protect Yourself Effectively
A short message pops up: a supposed SMS from a delivery service announces a package, a warning from your bank urges you to immediately confirm your account details, or a supposed friend reaches out from a new number. These text…
When Malware Talks Back: Real-Time Interaction with a Threat Actor During the Analysis of Kiss Loader
Talking to a malware author is a rare occurrence, something most analysts hear about but rarely experience themselves. Identifying the individual behind a malware campaign is often one of the most difficult aspects of threat research. In this case, what…
When Malware Talks Back: Real-Time Interaction with a Threat Actor During the Analysis of Kiss Loader
Talking to a malware author is a rare occurrence, something most analysts hear about but rarely experience themselves. Identifying the individual behind a malware campaign is often one of the most difficult aspects of threat research. In this case, what…
Sweet Minecraft Mods – The Dark Tale of SugarSMP Scam, Malware & Extortion
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Sweet Minecraft Mods – The Dark Tale…
Sweet Minecraft Mods – The Dark Tale of SugarSMP Scam, Malware & Extortion
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Sweet Minecraft Mods – The Dark Tale…
Endgame Harvesting: Inside ACRStealer’s Modern Infrastructure
The vector is deceptive. The Loader is sophisticated and at this point, it’s already game over. This article has been indexed from Security Blog G Data Software AG Read the original article: Endgame Harvesting: Inside ACRStealer’s Modern Infrastructure
NIS-2: What the end of the registration period means for management teams
March 6, 2026, marks the end of the registration period for companies that fall under the NIS-2-Directive. Registration with the “Bundesamt für Sicherheit in der Informationstechnik” (BSI) will transform the regulatory transition period into a binding supervisory situation. This will…
Use of LLMs for Malware Analysis: Doing it the right way
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Use of LLMs for Malware Analysis: Doing…
Free Games, Costly Consequences
PiviGames, a popular Spanish gaming platform is well-known in the gaming community for providing download links to pirated PC games. Such a platform offers attractive content and it has built a reputation within the gaming community over the years. However,…
“Managed SOC from G DATA CyberDefense is expert protection for everyone, around the clock from Germany”
Oberberg-Online Informationssysteme GmbH is a long-standing G DATA sales partner and relies on the Managed Security Operations Centre (SOC) solution from the German cyber defence specialist. In our series ‘The minds behind G DATA Managed SOC’, Dirk Zurawski talks about…
Testing with live malware: Good Intentions, Problematic Execution
Using AI to contain threats is a logical step in technological development. Testing countermeasures is also a good idea to ensure they work as intended. It becomes problematic, however, when real malware is used for testing. This article has been…
OpenClaw: Hit the ground running, with security lagging behind
OpenClaw has cause quite the stir among AI enthusiasts during the past few weeks – and it has also been cause for a few more gray hairs among security experts. But what is the whole hoopla about with OpenClaw? This…
Officials sound the alarm: Phishing attacks on politicians, journalists via Signal messenger
Attackers believed to be state-sponsored are currently attempting to take control of Signal accounts belonging to politicians, journalists, and other high-profile individuals in Germany and across Europe. In doing so, they pose, for example, as a Signal support chatbot. This…