Proposing Solutions for the SolarWinds Attackers’ MFA Bypass (Part 2)

winmagic logo color 400In our previous article in this series, we highlighted a very serious threat to networks of all kinds: The hackers presumed to be behind the large-scale breach of SolarWinds’ Orion platform have also been linked to an attack that compromised a multi-factor authentication system. By gaining read access to  the MFA server, it’s possible for a bad actor to generate false cookies and gain authenticated user privileges.


Die vier Regeln für das Datenschutz-Hygiene-Konzept

VirtualSolutions Logo 400x120Wenn uns die Pandemie eins gelehrt hat, dann ist es der sorgfältige Umgang mit Hygiene – Händewaschen wird wohl so schnell keiner mehr vergessen. Nach diesem Vorbild sollten sich Unternehmen das Thema Datenschutz zu Herzen nehmen. In diesem Blogpost haben wir erklärt, dass der Datenschutz die gleiche Aufmerksamkeit bekommen sollte, wie der Schutz vor Bakterien und Viren. 


Warum Unsichtbarkeit für die Lieferkettensicherheit unerlässlich ist

vadesecureDie im Dezember 2020 entdeckte Sicherheitslücke bei SolarWinds war ein atemberaubender Schachzug in der Cyber-Kriegsführung, der neun Monate lang unentdeckt blieb. Der Angriff ist eine der schwerwiegendsten, jemals verzeichneten Lieferketten-Sicherheitsverletzungen, es sind rund 18.000 staatliche und private Netzwerke betroffen.


Reducing Enterprise Cyber Risk During COVID-19

threatquotient logo 400x160With COVID-19 now revving its engine, I suspect that many of you are reading this article from the kitchen table, perhaps still in your pajamas. But even before the present global virus situation, this casual teleworking image was pretty familiar for many job functions. I mean – let’s be honest: Checking email is checking email – regardless of whether this mindless task is done on the corporate LAN or across your home broadband.


State of Digital Trust: How the Virtual Economy Changed Consumer Behavior

okta logo 400 colorOver the past year, people around the world have moved online and now conduct most of their daily lives digitally — from classes to grocery shopping; from doctor appointments to holiday celebrations. These digital shifts have required increased trust from all of us. Employees and employers have had to trust each other to work securely and productively from new locations (sometimes during different working hours), consumers have had to trust businesses to keep their personal data safe.


Fiction is Becoming Reality When it Comes to Cybercrime

onelogin 400x120 colorWe need to start thinking of sci-fi and fantasy as educational instead of fictional. We have already been using them as inspiration for years. The first flip phones certainly looked a lot like the communicators from classic Star Trek. But are we looking at them to anticipate the nefarious schemes the bad guys might come up with?


What Are Microservices?

okta logo 400 colorMicroservices architecture, also known simply as “microservices,” is an approach to building software with modular services that are distinct and independent from each other. In recent years, microservices have become a popular choice for designing and deploying applications. They allow apps to be broken into smaller and loosely coupled pieces (microservices) that are independently tested, maintained, and deployed.


Ectacom HQ München

ectacom GmbH
+49 8102 8952-0
Friedrich-Bergius-Str. 12
D-85662 Hohenbrunn

Ectacom Wien

ectacom GmbH
+43 664 42 20 555
Am Europlatz 2
A-1120 Wien


Ectacom Polen

ectacom Salesbüro
+48 501 295 580
Diese E-Mail-Adresse ist vor Spambots geschützt! Zur Anzeige muss JavaScript eingeschaltet sein!