top of page
BLOG



🕵️♀️💻 When attackers pose as IT support: next-generation social engineering 🕵️♀️💻
Cybercriminals are using Microsoft Teams for sophisticated social engineering attacks. Find out how companies can protect themselves.

Daniel Eberhorn
Nov 7, 2024


🚨 Goodbye to password changes? Why BSI and NIST are only partially right! 🚨
Goodbye to password changes? Why the new NIST and BSI recommendations are useful, but still not risk-free.

Daniel Eberhorn
Oct 8, 2024


⚙️ Authentication Reinvented: Passwordless in the Digital Future 🌍
Discover how passwordless and biometric authentication can transform enterprise security. Protect your data efficiently in the digital age.

Daniel Eberhorn
May 18, 2024


🎭👁️ From Illusion to Reality: The Dark Sides of Multi-Factor Authentication (MFA) 👁️🎭
Discover hidden MFA risks and strengthen your cybersecurity defenses.

Daniel Eberhorn
Apr 27, 2024


🛡️💼 'Tycoon' Malware Kit Bypasses Microsoft and Google MFA Protection 💼🛡️
Tycoon 2FA PhishKit: A Sophisticated Threat Bypassing Microsoft and Google MFA Protection.

Daniel Eberhorn
Apr 8, 2024
bottom of page