Imprint
Zerberos Andriu IsenringHeuelsteig 98032 ZurichSwitzerland info@zerberos.ch MWST-Nr.:CHE-328.895.446 MWST
Zerberos Andriu IsenringHeuelsteig 98032 ZurichSwitzerland info@zerberos.ch MWST-Nr.:CHE-328.895.446 MWST
Protecting web applications from hackers requires implementing multiple layers of security measures. Here are some key steps to protect web applications from hackers: It’s important to note that web application security is an ongoing process and requires continuous monitoring, updates, and improvements. It’s recommended to follow a holistic security approach that includes technical, organizational, and … Read more
Here are some ways a company can protect itself from social engineering attacks: It’s important to remember that social engineering attacks are often well-disguised and sophisticated, and attackers constantly evolve their tactics. Therefore, a multi-layered approach that includes employee awareness and training, strong technical controls, and regular security assessments is essential to protect a company … Read more
There are several best practices to ensure the security of Wi-Fi networks. Some of the key best practices include: By implementing these best practices, you can help enhance the security of Wi-Fi networks and reduce the risk of potential security breaches or unauthorized access. It’s important to stay updated with the latest security recommendations and … Read more
Some of the most important cyber threats that organizations and individuals face include: It’s important to note that the cyber threat landscape is constantly evolving, and new threats can emerge. Organizations and individuals need to regularly update their cybersecurity measures, implement best practices, and stay informed about the latest threats to effectively protect their systems, … Read more
The main difference between an external and an internal penetration test is the scope and location of the test within the target organization’s network. Both external and internal penetration tests are important for comprehensive cybersecurity assessments. External penetration tests focus on identifying vulnerabilities that could be exploited by external attackers who are trying to breach … Read more
A penetration test, often referred to as a “pen test” or “ethical hacking,” is a type of cybersecurity assessment that involves simulating a cyber attack on a computer system, network, application, or other digital asset in order to identify vulnerabilities and weaknesses that could be exploited by malicious hackers. The purpose of a penetration test … Read more
Am 12. August 2021 wurden die Pallas Kliniken gemäss Medienmitteilung Opfer einer Cyber Attacke – die Systeme wurden vom Netz getrennt und die Kliniken sind aktuell nur noch telefonisch erreichbar. Gemäss Mitteilung wurde das Problem erkannt und wird zur Zeit behoben – Patientendaten seien nicht betroffen und die Betreuung der PatientInnen sei gewährleistet.
iMazing ist eigentlich ein Tool zum Verwalten von Inhalten auf iPhones: Musik, Photos, Nachrichten etc und kann auch zum Erstellen von Backups verwendet werden. In der aktuellen Version kann das Tool aber auch mittels eingebautem “Spyware Detector” die von Amnesty International gemeldete Version von Pegasus erkennen, es verwendet dazu die von Amnesty International zur Verfügung … Read more
It is not enough anymore to take a defensive stance only against cyber attacks – preparations have to be done for maintaining operations and continue business services despite (successful) cyber attacks. The focus should be on the most business critical assets and ressources. Where are these, how are they protected and how are they backed … Read more