
Over 1.000 companies are facing infected WordPress websites whose security is threatened by JavaScript backdoors. The attack method uses four different backdoors for maximum damage. Companies must therefore implement proactive security strategies.
"I gave them a get-out-of-jail-free card”, says Schneider. “They were supposed to take everything that was possible – nobody knew about it except me, not even the management.” The penetration testers at ProSec take their assignments very seriously - and sometimes literally. During this penetration test, they even ended up stealing several company cars without anyone noticing. How little was needed for this and how our co-founder Immanuel Bär and his team colleagues were able to gain full control over the IT of an apparently well-secured production company during the course of the operation is impressively described in this article on heise online:
Read the full story in the article on heise online:
Missing Link: How a company lost control in a cyberattack
Here we have compiled the most important learnings for those responsible in companies from the article so that your company cars, data and infrastructures are protected against malicious hackers in the future.
Can our penetration testers (or, the real problem: malicious hackers) just walk into your company and gain access without hindrance? Here are 10 lessons that will help you confidently answer this question with “No!” in the future:
IT security does not only affect IT – it is a task for the entire company.
Over 1.000 companies are facing infected WordPress websites whose security is threatened by JavaScript backdoors. The attack method uses four different backdoors for maximum damage. Companies must therefore implement proactive security strategies.
Hackers use misconfigurations in AWS for targeted phishing attacks. Companies are thus unknowingly opening their IT infrastructure to attacks. Traditional security measures often fail to defend against this threat.
Security researchers discover a security hole in Apple's "Find My" network that enables industrial espionage. Using the "nRootTag" method, attackers can secretly turn devices into tracking devices. Companies around the world are alarmed and are looking for protective measures.
We use cookies, and Google reCAPTCHA, which loads Google Fonts and communicates with Google servers. By continuing to use our website, you agree to the use of cookies and our privacy policy.