Blog
Informative, up-to-date and exciting – the Oneconsult Cybersecurity Blog.

Attack Simulation & Red Teaming: News & Trends

In our Attack Simulation and Red Teaming Blog, you will gain in-depth insights into security tests that simulate real cyber attacks to test the resilience of your IT systems and security measures. Our articles provide you with in-depth information on the various methods, techniques and tools used by experienced Red Teams to uncover vulnerabilities before real attackers can exploit them.

Whether you are interested in the strategy behind Red Teaming, practical use cases or the latest developments in cyber security, you will find valuable insights to optimise your defence strategies and secure your organisation against cyber threats.

social engineering_schutz und praevention

Social Engineering – Risks and Prevention for Businesses

It is estimated that companies worldwide suffer billions worth of damages each year due to social engineering attacks. In response to the significant advancements made by companies in strengthening their technical defenses against cyberattacks in recent years, attackers are seeking new methods to gain unauthorized access to networks and obtain data. In essence, this is not a new phenomenon, but rather a shift back to the traditional methods used by attackers.

MORE
Nutzen von Red Teaming

Red Teaming: What Are the Benefits and Who Is It Useful For?

In an increasingly complex and dynamic world, it is essential for organizations to continually review and improve their security and defense strategies. One of the most effective ways to uncover vulnerabilities and build resilience is through red teaming. But what exactly is red teaming? And for what types of organizations is it best suited?

MORE
Schwachstellenanalyse mit MITRE ATT&CK

Vulnerability Analysis With MITRE ATT&CK

The non-profit organization MITRE has been documenting Tactics, Techniques and Procedures (TTPs) used by known Advanced Persistent Threats (ATPs) since 2013. The result is the MITRE ATT&CK® Framework. ATT&CK stands for “Adversarial Tactics, Techniques & Common Knowledge”.

MORE
Spear Phishing

What Is a Spear Phishing Attack?

In the digital world, we are exposed to various threats every day. One of the most sophisticated and effective attacks is spear phishing. Unlike regular phishing attacks, where cybercriminals send mass emails hoping to deceive a few users, spear phishing targets specific individuals or organizations.

MORE
Erhöhen Sie Ihre Cyber-Resilienz durch Purple Teaming

Increase Your Cyber Resilience Through Purple Teaming

Purple teaming results from the merging of the red (team) and the blue (team) and illustrates how the two teams work together to improve the cyber security of an organization. This is achieved through a cooperation between the two teams, where attack scenarios are discussed, carried out, and analyzed jointly by both teams.

MORE

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts