Botnets – the invisible armies of the internet

Botnets are fascinating and frightening at the same time; they show how vulnerable our networked world really is when devices become digital soldiers in an invisible war. Botnets are one of the most dangerous threats in the modern cyber world. They consist of thousands to millions of networked computers that

Read more »

UAC Bypass via Sdclt: What companies should know

In today’s digital era, in which companies are increasingly reliant on complex IT infrastructures, the security of these systems is a key challenge. A current example is the UAC bypass that is executed via sdclt.exe, which presents companies with major challenges and is becoming particularly explosive. The UAC is a

Read more »

Security warning: Private use of a company computer

Despite the known risks, many people use their company computer privately, often out of convenience or because the guidelines are unclear. Working from home blurs the boundaries between work and leisure for some employees, which favours private use. In addition, many underestimate the risks to IT security or have no

Read more »