- All
- Cyber & Information Security
- Digital Transformation
The e2 Security Rulebook: How to survive in the Internet

…without being ripped off, scamed, or getting stolen your identity This set of rules is intend...
We are against any form of violence and war

The employees of e2 Security stand by our friends in Ukraine. We as a company are for the protection...
Case Study – Reflected Cross-Site-Scripting in Weglot Translator Plugin

Recently, we discovered a cross-site scripting vulnerability during a penetration test, which was on...
HTTP Verb Tampering

When testing web applications for security flaws, the applications’ handling of different HTTP req...
Digital transformation requires a solid cyber security

During and after my studies of business administration I worked in different areas and companies. Mo...
Cross Site Scripting

From a high level, cross site scripting (short: XSS) can be described as the embedding of foreign co...
Phishing: These are the most popular tricks

For criminals and fraudsters, personal data of Internet users is always very desirable. In many case...
Clickjacking

What is Clickjacking? Clickjacking takes place when a fraudster sets up an overlaid website interfac...
What is KRITIS and who does it affect?

In Germany, special regulations apply to operators of critical infrastructures under the Federal Off...
Hard Coded Credentials for Dummies

Hard Coded Credentials for Dummies or How to not unknowingly, accidently and unconsciously reveal ...
Password leaks and how to deal with them

At the beginning of April 2021, information was published that personal data of more than 500 millio...
Who is Hacker’s favorite?

How well is my company positioned when it comes to cybersecurity? Are we way ahead of the game or do...
No More Posts