Phone call Mail
Now free initial consultation by mail or phone: +49 228 - 33 88 89 0

The EnBITCon Blog

Increase in malvertising: BatLoader and IcedID use sophisticated strategies to infect user systems

The threat of malvertising is growing, and two prominent players, BatLoader and IcedID, take center stage.
Published on 27 July 2023 Sophos   Cybersecurity, Malware, Cyber Threat

The art of manipulation: how social engineering works in the cyber world

The art of manipulation - discover the invisible threat!
Published on 21 July 2023 On our own behalf   Sicherheitsrisiken, Cyberkriminalität, Social Engineering

From smart devices to networked threats: the security risks of the IoT

Learn about the security risks of the IoT and proven measures to secure your smart devices.
Published on 14 July 2023 On our own behalf   Cybersecurity, Sicherheitsrisiken, IoT

Cloud security 101: Basics and best practices for the secure use of cloud services

Secure your cloud data and applications with proven methods!
Published on 6 July 2023 On our own behalf   Cloud, Datensicherheit, 101

The Ruckus ICX 8200 switch: Perfect connectivity for modern networks

In today's networked world, a reliable and high-performance network infrastructure is indispensable.
Published on 30 June 2023   Switch, Netzwerk, Ruckus