Tutorial Featured

VeraCrypt Part 2: Android Encryption

Comprehensive guide to using VeraCrypt on Android devices. Learn how to create and manage encrypted containers on mobile platforms.

12 min read 10,460 monthly searches
Read Article
Security Awareness Featured

Phishing: The Most Popular Tricks

Discover the most common phishing techniques and learn how to protect yourself and your organization against social engineering attacks.

8 min read 1,950 monthly searches
Read Article
Web Security

Cross-Site Scripting (XSS) Explained

Detailed explanation of XSS vulnerabilities with practical examples. Understand the different XSS types and effective countermeasures.

10 min read 1,530 monthly searches
Read Article
Web Security

HTTP Verb Tampering

Understand HTTP Verb Tampering attacks and how attackers can bypass security mechanisms by manipulating HTTP methods.

9 min read 620 monthly searches
Read Article
Secure Coding

Hard-Coded Credentials for Dummies

Why hard-coded credentials represent a critical security risk and how you can avoid this vulnerability in your code.

7 min read 810 monthly searches
Read Article
Digital Transformation Featured

Digital IT Ops & Business Transformation

How modern IT operations drive digital transformation and what role cybersecurity plays in this process.

11 min read 5,250 monthly searches
Read Article
Security Strategy

End-to-End Security & Transparency

What a true end-to-end security approach means and why transparency is a key factor for successful cybersecurity.

9 min read 720 monthly searches
Read Article
Compliance

What is KRITIS and Who Does It Affect?

Comprehensive guide to KRITIS (Critical Infrastructure) and the NIS2 Directive. Find out if your organization is affected and what requirements apply.

10 min read 400 monthly searches
Read Article
Case Study

Case Study: Reflected XSS in Weglot

Real case study about the discovery and reporting of a Reflected XSS vulnerability in the Weglot plugin. Responsible Disclosure in practice.

8 min read Case Study
Read Article
Network Security

The Case for Flat Networks

Controversial discussion about flat network architectures vs. segmentation. When does which approach make sense?

9 min read 330 monthly searches
Read Article

Want to be notified about new articles?

Contact us to receive regular security updates

Get in Touch