Security requirements
Find the technical reqiremehs here as an ZIP-document for download.
Please try the following options:
Your search resulted in 5192 hits.
Security requirements
Find the technical reqiremehs here as an ZIP-document for download.
E-Paper Trust_NewWork@Telekom
hatefree: Legal support in the face of digital violence
Beleidigungen, Drohungen oder sexuelle Belästigung im Netz nehmen zu. hatefree bietet Opfern juristische Hilfe.
Flubot under the Microscope
Maybe Flubot is for SMS what Emotet was for email: a spam kingpin. How does it work and how do the operators prevent infiltration?
Let’s set ice on fire: Hunting and detecting IcedID infections
Emotet ist dead. IcedID belongs to the contenders to take its place. This is how you hunt for samples and detect local infections.
Inside of CL0P’s ransomware operation
Cybercrime actor TA505 started three waves of spam in 2020 to find new victims. Here are insights into their ransomware operations.
TA505 returns with a new bag of tricks
Cybersecurity: In this blogpost, Thomas Barabosch, shows you a new technique of big threat actor TA505: basically, it’s about operations for big game hunting.
LOLSnif – Tracking Another Ursnif-Based Targeted Campaign
Cybersecurity: Tool leaks are very interesting occurrences in cyber security. In his new blog post, Thomas Barabosch analyze a newer version of Ursnif.
Variant of Satori/Mirai detected attacking public available ADB shells
On the 10th of July at 23:30 UTC we noticed an increased traffic on our blackhole monitoring on TCP port 5555. Upon further analyzation, we saw a big chunk of this traffic coming from China, USA and the Dominican Republic. In total we gathered 246.434 packets...
Deutsche Telekom launches first M2M Marketplace
Global distribution channel for machine-to-machine products.