Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
Security Blog G Data Software AG
feeds.feedburner.com
An AI-generated phishing attack on myself: How Cybercriminals Use ChatGPT and Similar Tools
blog.gdatasoftware.com
·
2d
Municipalities in the Crosshairs: “They Are Easy Prey for Cybercriminals”
blog.gdatasoftware.com
·
2w
“G DATA’s Security Awareness trainings have significantly increased security awareness at HBC-radiomatic”
blog.gdatasoftware.com
·
3w
NIS-2 in Practice: How a Managed SOC Supports Compliance with Regulatory Requirements
blog.gdatasoftware.com
·
3w
Fake Document, Real Access: Foxit Impersonation Enables Stealth VNC Control
blog.gdatasoftware.com
·
3w
Claude Mythos: Dangers and rewards, right next to each other
blog.gdatasoftware.com
·
4w
Implementing NIS-2: Obligations, deadlines and practical tips
blog.gdatasoftware.com
·
4w
"Pics or it didnt happen" - What BlueHammer tells us about Vulnerability Disclosure
blog.gdatasoftware.com
·
5w
Security Awareness: Why employees are essential for IT security
blog.gdatasoftware.com
·
5w
Phishing SMS: How to Recognize Fraudulent Messages and Protect Yourself Effectively
blog.gdatasoftware.com
·
7w
When Malware Talks Back: Real-Time Interaction with a Threat Actor During the Analysis of Kiss Loader
blog.gdatasoftware.com
·
8w
Sweet Minecraft Mods – The Dark Tale of SugarSMP Scam, Malware & Extortion
blog.gdatasoftware.com
·
9w
Endgame Harvesting: Inside ACRStealer’s Modern Infrastructure
blog.gdatasoftware.com
·
9w
NIS-2: What the end of the registration period means for management teams
blog.gdatasoftware.com
·
11w
LLMs in malware analysis: Doing things right is difficult
blog.gdatasoftware.com
·
11w
HijackLoader: Free Games, Costly Consequences, and Loads of Malware
blog.gdatasoftware.com
·
11w
"Managed SOC from G DATA CyberDefense is expert protection for everyone, around the clock from Germany"
blog.gdatasoftware.com
·
12w
Testing with live malware: Good Intentions, Problematic Execution
gdatasoftware.com
·
13w
OpenClaw: Hits the ground running, with security lagging behind
gdatasoftware.com
·
13w
Officials sound the alarm: Phishing attacks on politicians, journalists via Signal messenger
gdatasoftware.com
·
14w
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help