ProSec GmbH

+49 261 45093090

  • About us
  • Services
    • Detection services
      • Classic penetration testing
      • Pentest as a service
      • Web application pentest
      • Vulnerability analysis
      • Red teaming
    • Solution services
      • IT security consulting
      • Data protection
        • GDPR
    • Education services
      • User awareness
      • Trainings
        • Junior penetration tester
        • Penetration tester web
        • Penetration tester network
  • Wiki
  • Jobs
  • Contact

ProSec Wiki for

IT Security Knowledge
Vulnerabilities
  • All
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Z
PSN_KB_RagnarLocker_Ransomware.jpg
RagnarLocker Ransomware
PSN_KB_malware
HermeticWiper Malware
Log4j - Critical vulnerability protection
Log4j – Critical vulnerability protection
SMS Phishing
SMS Phishing – Smishing
Wiki Virusschutz linux
Antivirus at Linux?
Wiki Virusschutz apple
Antivirus Mac
Smartphone Microsoft Teams Schwachstelle
Zero-Click RCE Vulnerability Reported in Microsoft Teams
Wiki Cyberangriffe Unternehmen
Cyber attacks on businesses
X Detection and Response (XDR) Wiki
X Detection and Response (XDR)
Wiki Bild Firewall post
Firewall (What is a firewall? How does a firewall work?)
User and Entity Behaviour Analytics
User and Entity Behaviour Analytics (UEBA)
Wiki Bild SPAM Post
Spam – the well-known plague
Endpoint Detection and Response Wiki
Endpoint Detection and Response (EDR)
DNS-Tunneling erkennen
DNS tunneling detection
Technology infrastructure cloud computing and communication. Internet concept.
Network Traffic Analysis
Wiki Bild Mobile Device Management
Mobile Device Management
DSGVO
Data protection training mandatory according to GDPR
Nationalgarde Cyberangriff
Exclusive: National Guard called up to thwart cyberattacks in Louisiana weeks before the election
AdobeStock_207793822
Warning AA20296A
Wiki_Bild_IoT
Infected IoT devices in the anonymity service
Wiki Bild Malware
Malware uses fake Windows update notifications
XaaS – Everything as a Service
XaaS – Everything as a Service
Warnung (AAA-283A)
Warning (AAA-283A)
Schutz im Internet und sich im Internet schützen
How can you protect yourself on the Internet?
Wiki Bild Private Daten Schützen
Protect private data
Virenscanner
Virus scanner
vulnerabilities in your company
Successfully identify vulnerabilities
Wiki Bild Spear-Phishing
Spear-Phishing
Wiki_Bild_Nessus_post
Nessus & Open VAS
IT-Outsourcing Übersicht
What actually is IT outsourcing?
A warning about the Russian hacker group "APT29".
Warning APT29
passwortmanager
Use password manager in the company
Cyberangriff
What is a cyber attack?
you´ve been hacked
Hacked, what to do?
Image of a Technical data protection
Technical data protection
Abbildung der Funktion eines Proxy-Servers
Proxy server
Wiki_Bild_CVSS_Wiki_Wiki
CVSS – The Common Vulnerability Scoring System
wiki_cybersecurity
Cybersecurity
Emotet, Emotet Trojaner
Emotet – evolution of malware
common_weakness_enumeration
CWE – Common Weakness Enumeration
Penetration Test
External & internal penetration testing
IT Sicherheitsaudit
IT security audit
Hackertypes Wiki
Hackers – categorization of attacker-groups
back to the Office
From the home office back to the office
SOC CERT
SOC (Security Operation Center)
Kerberos
Kerberos protocol
exploit
Exploit / Zero-Day Exploit
SIEM Security Information and Event Management
SIEM
Rainbow table attack
Rainbow table attacks
Cyber Versicherungen
Why does cyber insurance make sense?
Buffer overflow attack
Buffer overflow attack
Malware
What is malware?
Cross Site Request Forgery
Cross-Site-Request-Forgery
Man in the Middle Attack
Man in the middle attack
Bild eines Mitarbeiters im Home-Office
Introduce home office, but how?
Trojanische Pferd
Trojans
Ransomeware
What is ransomware?
Cryptographic hash functions
Cryptographic hash functions
Informationssicherheitsmanagementsysteme
Information security management systems
Brute-Force-Angriff
Brute Force Attack
MacBook Social Engineering
Social Engineering
Abbildung eines TLS-Locks
Transport Layer Security
Authentisierung vs. Authentifizierung vs. Autorisierung
Authentication vs Authentification vs Authorization
VPN Virtual-Private-Network
Virtual Private Network
DDOS Attack
Denial of Service Attack
Internet of Things
Internet of Things
phishing
What is phishing?
bug bounty
Expert point of view: bug bounties
Penetration Test
The job as a penetration tester
Coding
0-Day: Our Vulnerability Disclosure Guideline
Bild einer Welle im Meer
Vulnerability in almost all the hot spots!
Password Note
Passwords annoying?
Easy Box 804 - Menu
Open Redirect – Vodafone Easybox 804
Logo eset
ESET Updates unencrypted
ferrari
Car Keys – Ferrari hacked – ADAC’s false alarmism

OUR LOCATIONS

  • Headquarters:
  • ProSec GmbH
  • Robert-Koch-Straße 1-9,
    D-56751 Polch, Germany

  • Berlin office:
  • ProSec GmbH
  • Friedrichstr. 123,
    D-10117 Berlin, Germany

 

  • Munich office:
  • ProSec GmbH
  • Franz-Joseph-Str. 11,
    D-80801 München, Germany

TOP-SERVICES

  • Penetration testing

  • Vulnerability analysis

  • Trainings

  • IT security consulting

  • Social engineering

All rights reserved. © 2022 ProSec GmbH | Imprint | Privacy policy | Sitemap