HvS header hintergrund background blog

HvS Cyber Security Blog

Cyber security insights. No fluff. Just facts.

Information Security
NIS-2-Betroffenheit von KMU - Studienergebnisse

Many SMEs are affected by NIS-2 without even knowing it. The HvS study highlights key hurdles, practical examples, and pragmatic paths to greater cyber resilience.

Read more
Cyber Security
Man in the middle attacks on ai agents

AI agents may prioritize task completion over security. This article demonstrates how man-in-the-middle attacks can lead to reverse shells, supply chain compromise, and SSH exploitation.

Read more
Information Security
NIS-2 directive, overview and requirements

Learn which companies are affected by the NIS-2 Directive, what obligations apply, and how NIS-2 differs from KRITIS, ISO 27001, and TISAX®.

Read more
Information Security
NIS-2 Umsetzung:  Praxisleitfaden zur rechtssicheren Compliance [inkl. Checkliste]

Practical guide to NIS2 implementation covering scope assessment, maturity levels, ISMS, key requirements and a comprehensive compliance checklist.

Read more
Cyber Security
npm supply chain attack

Shai-Hulud and npm attacks: what developers need to know about software dependency risks and how to protect themselves.

Read more
Cyber Security
INC Ransom Attack: From Initial Access to Full Encryption in 48 Hours

How INC Ransom encrypts systems via the FortiGate vulnerability in just 48 hours – and why timely patching is crucial. Includes background & recommendations.

Read more
Information Security
EASA Part-IS einfach erklärt, was Luftfahrtunternehmen wissen müssen

A straight-forward explanation of EASA Part-IS: What are the regulations and what do they require? Who is affected? Our experts will show you how to get your ISMS & ISMM in shape now.

Read more
Information Security
Bild eines externen informationssicherheitsbeauftragten

Find out why an external ISO is an effective solution for SMEs in particular to ensure information security and compliance - regardless of legal obligations. Benefits, tasks and cooperation options at a glance.

Read more
Cyber Security
NFS Security

Understand security features, misconfigurations and technical attacks on NFS shares.

Read more
Cyber Security
Bild mit verschiedenen Screens, als Darstellung für Monitoring

Structured information and tips for dealing with the log4j vulnerability (CVE-2021-44228)

Read more
Cyber Security
Hackers mit einem Tablet in der Hand, photo of a hacker with a tablet in his hands_16_9

Spies dressed up as hackers. In this article, we highlight the APT fallout of vulnerabilities such as ProxyLogon in Exchange (Hafnium), OGNL Injection and log4shell

Read more
Cyber Security
HvS Security Schild, shild

Lazarus Report: Anatomy of a cyber espionage campaign. A full report, IOCs and YARA rules of a coherent Advanced Persistent Threats (APT) campaign

Read more