Computer Science

Microsoft is pushing forward with replacing NTLM and intends to consistently prioritize Kerberos.

Microsoft is pushing forward with replacing NTLM

News

Microsoft is pushing forward with replacing NTLM and intends to consistently prioritize Kerberos. A three-phase plan is designed to first create transparency, then ease migration, and ultimately block NTLM by default in a future Windows generation.

Notepad++ Hijacked Incident Update

Notepad++ Hijacked Incident Update

News

Notepad++ Hijacked Incident Update. WinGUp updates were selectively redirected. Learn how to verify signatures and safely upgrade to v8.9 or later. Since then, Notepad++ has significantly hardened the update process with signature and certificate checks.

Kimwolf Botnet Threat via Residential Proxies.

Kimwolf Botnet: Threat via Residential Proxies

News

Kimwolf Botnet: Threat via Residential Proxies. Kimwolf Botnet threatens enterprise networks by leveraging residential proxies. This enables it to scan local IP ranges from within home networks, increasing the risk that corporate and government environments may be indirectly affected. Research findings and telemetry data suggest a scale of more than 1.8 million to over 2 million compromised devices.

About this blog

Welcome! This website offers a wide range of information and resources on information security, cybersecurity, web, IT, and digitalization. Originally created as a personal knowledge database and note portal, the blog has evolved and expanded over time.

Here you will find a constantly growing glossary on IT security as well as articles on various topics such as risk management, ISO 27001, cloud computing security, and web design. Whether you are an expert or an enthusiast, the blog offers you useful information and insights into the latest developments and best practices in IT security and digitalization.

What is the goal of this blog?

The blog aims to deepen the understanding of information security, cybersecurity, and digitalization in order to raise awareness of the growing importance of these topics in our increasingly connected world. In light of rapid technological advances and the increasing number of cyberattacks, it is more important than ever to address these issues.

Today, the threat landscape is constantly growing, and cybercriminals are developing increasingly sophisticated attack methods. Therefore, it is crucial to be informed about the latest security risks and protective measures. Through the constant exchange of knowledge and experience, we can jointly shape a secure digital future. This way, we can arm ourselves against the challenges of an increasingly complex cyber landscape.

InfoSec – Glossary
No results found.
Our newsletter

Subscribe and never miss any content

[mc4wp_form id=”730″]

Our newsletter

Subscribe and never miss any content

[mc4wp_form id=”730″]

Web

WordPress SEO 2026

WordPress SEO 2026: Deep-dive guide for zero-click, GEO, E-E-A-T, information gain, digital consensus, and technical stability—built for rankings and AI citations.

WordPress SEO 2026: Deep-dive guide for zero-click, GEO, E-E-A-T, information gain, digital consensus, and technical stability—built for rankings and AI citations.
No results found.

Glossary

Most important terms related to cybersecurity, information security, GRC and pentesting.

No results found.