top of page
BLOG


π΅οΈββοΈπ» When attackers pose as IT support: next-generation social engineering π΅οΈββοΈπ»
Cybercriminals are using Microsoft Teams for sophisticated social engineering attacks. Find out how companies can protect themselves.

Daniel Eberhorn
Nov 7, 2024


π¨ Goodbye to password changes? Why BSI and NIST are only partially right! π¨
Goodbye to password changes? Why the new NIST and BSI recommendations are useful, but still not risk-free.

Daniel Eberhorn
Oct 8, 2024


βοΈ Authentication Reinvented: Passwordless in the Digital Future π
Discover how passwordless and biometric authentication can transform enterprise security. Protect your data efficiently in the digital age.

Daniel Eberhorn
May 18, 2024


πποΈ From Illusion to Reality: The Dark Sides of Multi-Factor Authentication (MFA) ποΈπ
Discover hidden MFA risks and strengthen your cybersecurity defenses.

Daniel Eberhorn
Apr 27, 2024


π‘οΈπΌ 'Tycoon' Malware Kit Bypasses Microsoft and Google MFA Protection πΌπ‘οΈ
Tycoon 2FA PhishKit: A Sophisticated Threat Bypassing Microsoft and Google MFA Protection.

Daniel Eberhorn
Apr 8, 2024
bottom of page
