Extinction Level Attacks: Ransomware

Posted on January 15, 2023 in Cybersecurity

In recent years, ransomware attacks have become increasingly common, causing significant damage to both individuals and organizations. A ransomware attack occurs when a cybercriminal encrypts the victim's data, making it inaccessible until the victim pays a ransom. These attacks can be devastating to businesses, leading to data loss, financial loss …

Continue reading

Establishing an Information Security Governance

Posted on May 01, 2022 in Cybersecurity

Information security aspects, decision-making and overall practices within an organization must be fostered through corporate governance practices. However, creating a governance framework for enacting policies in large enterprises is indeed challenging. Especially, when lots of subsidiaries belongs to an entity, the concern company is geographically distributed (multinational corporations), or heterogeneous …

Continue reading

Master's thesis: Social Engineering Awareness using Serious Games

Posted on January 02, 2021 in Cybersecurity

Last year I have attained my master's degree in Computer Science majoring in IT-Security. It has been a very long journey, but in the end I passed with distinction. I have to admit, I am especially proud of my master's thesis, which was jointly written with my fellow-student Saed Alavi …

Continue reading

Review: Attacking and Defending Active Directory

Posted on June 18, 2020 in Cybersecurity

Today I have finished the Attacking and Defending Active Directory course by passing the CRTP examination. At the moment, this course is relatively unknown. This is why I decided to write a review about it, since I really like the course. As its title already says, all the basics about …

Continue reading

Writing a Penetration Testing Report

Posted on April 30, 2020 in Cybersecurity

At the end of the day, the penetration test report is what is delivered to a client after performing the penetration test. For this reason, the report is really important. In this blog post I want to show you a good report writing methodology and I will share a sample …

Continue reading