AI-powered threat simulation neonotu is developing a state-of-the-art AI platform that continuously simulates real-world cyberattacks on critical infrastructure This platform: Uses machine learning to constantly generate and test new attack vectors Proactively identifies vulnerabilities before real attackers can exploit them Delivers detailed reports with the most accurate...
Cybersecurity Report 2024: Why companies need to act now
Die Bedrohungslage im Cyberraum hat einen kritischen Punkt erreicht. Laut aktuellen Erhebungen fand 2023 alle 39 Sekunden ein Cyberangriff statt – das entspricht über 2.200 Attacken pro Tag[6]. Diese alarmierende Entwicklung zeigt eine deutliche Beschleunigung im Vergleich zum Vorjahr, als die…
CrowdStrike disruption reveals vulnerabilities in global cyber security
On Friday, July 19, 2024, companies around the world experienced an unexpected digital standstill. The reason? A massive disruption caused by an update from CrowdStrike, one of the leading providers of cyber security solutions. This incident not only paralyzed the IT systems of numerous companies, but also revealed...
The invisible threat: how AI-driven cyberattacks are changing the rules of the game
In the early hours of March 15, the financial metropolis of Frankfurt woke up to a nightmare. The systems of one of Germany's largest banks were at a standstill. No ATMs were working, online banking was impossible and even internal communication systems were paralyzed. What at first seemed like an ordinary, if...
TeamViewer hack: A wake-up call for the security of remote access software
In the world of cyber security, no company is immune from attack - even those that offer security solutions themselves. The recent incident at TeamViewer, a leading provider of remote access software, underlines this harsh reality. On June 26, 2024, anomalies were detected within the...
The XZ attack: a shake-up in the software supply chain
The cybersecurity world was recently rocked by one of the most sophisticated software supply chain attacks: the XZ attack. This incident impressively demonstrates how vulnerable even trusted open source projects can be. The attack in detail: An attacker named “Jia Tan” built up trust in the open source community over a period of two years...
New ransomware threat: EstateRansomware exploits vulnerability in Veeam backup software
In the ever-evolving landscape of cybersecurity, a new ransomware group called EstateRansomware has caused quite a stir. This group exploits a recently patched vulnerability in Veeam Backup & Replication software, emphasizing the importance of regular software updates. The discovery: The...







