Certified Security Operations Center GmbH

UAC Bypass via Sdclt: What companies should know

In today’s digital era, in which companies are increasingly reliant on complex IT infrastructures, the security of these systems is a key challenge. A current example is the UAC bypass that is executed via sdclt.exe, which presents companies with major challenges and is becoming particularly explosive. The UAC is a

Read more »

Security warning: Private use of a company computer

Despite the known risks, many people use their company computer privately, often out of convenience or because the guidelines are unclear. Working from home blurs the boundaries between work and leisure for some employees, which favours private use. In addition, many underestimate the risks to IT security or have no

Read more »

Social Engineering – The Human Weakness in Cybersecurity

Social Engineering, a manipulative and sophisticated technique, often operates covertly yet can have profound implications. From phishing emails to elaborate scams, Social Engineering has become a serious risk for both businesses and individuals. In this article, we will delve into what Social Engineering is, how it operates, the dangers it

Read more »
error: