ProSec Wiki for IT Security KnowledgeVulnerabilities Search for:Search Button AllABCDEFGHIJKLMNOPRSTUVWXZAll A B C D E F G H I J K L M N O P R S T U V W X Z RagnarLocker Ransomware HermeticWiper Malware Log4j – Critical vulnerability protection SMS Phishing – Smishing Antivirus at Linux? Antivirus Mac Zero-Click RCE Vulnerability Reported in Microsoft Teams Cyber attacks on businesses X Detection and Response (XDR) Firewall (What is a firewall? How does a firewall work?) User and Entity Behaviour Analytics (UEBA) Spam – the well-known plague Endpoint Detection and Response (EDR) DNS tunneling detection Network Traffic Analysis Mobile Device Management Data protection training mandatory according to GDPR Exclusive: National Guard called up to thwart cyberattacks in Louisiana weeks before the election Warning AA20296A Infected IoT devices in the anonymity service Malware uses fake Windows update notifications XaaS – Everything as a Service Warning (AAA-283A) How can you protect yourself on the Internet? Protect private data Virus scanner Successfully identify vulnerabilities Spear-Phishing Nessus & Open VAS What actually is IT outsourcing? Warning APT29 Use password manager in the company What is a cyber attack? Hacked, what to do? Technical data protection Proxy server CVSS – The Common Vulnerability Scoring System Cybersecurity Emotet – evolution of malware CWE – Common Weakness Enumeration External & internal penetration testing IT security audit Hackers – categorization of attacker-groups From the home office back to the office SOC (Security Operation Center) Kerberos protocol Exploit / Zero-Day Exploit SIEM Rainbow table attacks Why does cyber insurance make sense? Buffer overflow attack What is malware? Cross-Site-Request-Forgery Man in the middle attack Introduce home office, but how? Trojans What is ransomware? Cryptographic hash functions Information security management systems Brute Force Attack Social Engineering Transport Layer Security Authentication vs Authentification vs Authorization Virtual Private Network Denial of Service Attack Internet of Things What is phishing? Expert point of view: bug bounties The job as a penetration tester 0-Day: Our Vulnerability Disclosure Guideline Vulnerability in almost all the hot spots! Passwords annoying? Open Redirect – Vodafone Easybox 804 ESET Updates unencrypted Car Keys – Ferrari hacked – ADAC’s false alarmism