Articles

System Intrusion

System Intrusion happens in an early phase of a cyber attack (Figure 1). It usually starts after attackers have collected enough data about the target and assembled tactics for their …

READ MORE

Web Application Security

Web Application Security

Web applications are often compromised by basic attacks that require only a small number of steps or additional actions after the initial compromise. The attackers are rather focused, for example, …

READ MORE

Social Engineering

Social Engineering

In social engineering, an attacker exploits the “human factor” as the supposed weakest link in the information security chain in order to accomplish his criminal intent. SECURNITE explains what Social Engineering is.

READ MORE

Security Talk

Security Talk

Sie sind verantwortlich für die IT-Sicherheit in Ihrem Unternehmen? Laufend werden Sie mit Nachrichten über Schwachstellen in den von Ihnen verwendeten IT-Produkten informiert, aber es fällt Ihnen nicht leicht, den …

READ MORE

The Threat Pyramid Scheme

Today one can observe constant attacks against every public IP address. Most of the attacks are fully automatic and not targeted towards a specific victim. These kind of attacks don’t …

READ MORE