Blog
Informative, up-to-date and exciting – the Oneconsult Cybersecurity Blog.

Penetration Testing Blog: All about pentests

In our Penetration Testing Blog you will find in-depth information, tips and best practices for testing your networks, applications and systems for vulnerabilities and securing them against potential threats. Our experts cover a wide range of topics – from how-to guides and the latest tools and techniques to up-to-date case studies and vulnerability analyses.

Stay informed and protect your digital assets with our constantly updated knowledge of penetration testing and cybersecurity.

passkeys-warum passwoerter ausgedient haben

Passkeys: Why Passwords Have Probably Become Outdated

An analysis of the most frequently lists of the most frequently used passwords shows that even today, passwords tend not to be very complex. This suggests that password managers, which would make it easier to create secure passwords, are rarely being used. As a consequence, many service providers rely on the addition of a second factor during the login process in order to reduce the dependency on the password. However, this solution is not an optimal measure as it does not fully address the problem of password security. A promising approach that could offer an alternative to passwords is the use of passkeys.

MORE
network penetration test

Network Penetration Test

In an increasingly digitalized world, companies of all sizes and in all industries are at risk of cyberattacks. It is therefore crucial for businesses to prioritize network security in order to protect sensitive information and business processes. Every year, thousands of attacks on corporate networks are recorded, whether by hackers, insiders, or automated malware. The consequences of such attacks can be severe, including data loss, business interruptions, significant financial losses, and a loss of customer trust.

MORE

Become a Proven Web App Penetration Tester With the Web Security Academy

What are the most common security vulnerabilities in web applications? What does an attacker need to do to find and exploit them? And how can developers protect their web applications against them? Answers to these questions as well as practical hands-on examples are provided by PortSwigger’s Web Security Academy.

MORE

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 6:00 p.m (exception: customers with SLA – please call the 24/7 IRR emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts