Articles

Denial of Service

A Denial of Service (DoS) attack aims at the availability of a service, website or network. By disrupting or suspending normal data flow, the system is rendered unavailable. Amplifying this …

READ MORE

Privilege Misuse

Privilege Misuse

The misuse of ones privileges is an intentional, malicious attack pattern. Most of the data breaches in 2021 in this category were caused by privilege abuse or data mishandling. They …

READ MORE

Human Error

Unintentional actions are among the most common patterns in information security incidents. Miscellaneous errors of employees can directly compromise assets of an organization and lead to data breaches. According to …

READ MORE

System Intrusion

System Intrusion happens in an early phase of a cyber attack (Figure 1). It usually starts after attackers have collected enough data about the target and assembled tactics for their …

READ MORE

Web Application Security

Web Application Security

Web applications are often compromised by basic attacks that require only a small number of steps or additional actions after the initial compromise. The attackers are rather focused, for example …

READ MORE

Social Engineering

Social Engineering

In social engineering, an attacker exploits the “human factor” as the supposed weakest link in the information security chain in order to accomplish his criminal intent. SECURNITE explains what Social Engineering is.

READ MORE

Security Talk

Security Talk

Sie sind verantwortlich für die IT-Sicherheit in Ihrem Unternehmen? Laufend werden Sie mit Nachrichten über Schwachstellen in den von Ihnen verwendeten IT-Produkten informiert, aber es fällt Ihnen nicht leicht, den …

READ MORE