Skip to content
Certitude Blog
  • Services
    • Security Assessments
    • Security Engineering
    • Security Governance
    • Cyber Response
  • About Us
    • Companies
    • Team
    • History
    • Values
  • Career
  • Research
  • Press
    • de
    • Deutsch

Articles

Categories
  • Career
  • Compliance
  • Conferences
  • Expertise
  • Incident Response
  • Press
  • Press Release
  • Security Strategy
  • Technical Analysis
  • Uncategorized
  • Vulnerability Research
CRA Update: The EU Commission drafts New Guidelines for “Important” and “Critical” Products with Digital Elements

CRA Update: The EU Commission drafts New Guidelines for “Important” and “Critical” Products with Digital Elements

Written by Kathrin Sock on 04.04.202504.04.2025

If you're building or selling digital products in the EU, now’s the time to act. As we covered in our previous article “Cyber Resilience Act Passed – What’s Coming for ...

Read More
Study together with the BSI: IT security of smart radiator thermostats

Study together with the BSI: IT security of smart radiator thermostats

Written by Wolfgang Ettlinger on 10.12.202411.12.2024

Certitude carried out the technical security testing of smart radiator thermostats on behalf of the Federal Ministry for Information Security (BSI). The study that ...

Read More
Trump’s Impact on Cyber Security & Europe

Trump’s Impact on Cyber Security & Europe

Written by Marc Nimmerrichter on 25.11.202425.01.2025

This article is a commentary on the assessment of current political developments and their impact on cyber security and Europe by Florian Schweitzer and Marc ...

Read More
Certitude @ BSides Berlin: A Closer Look at UPS Vulnerabilities

Certitude @ BSides Berlin: A Closer Look at UPS Vulnerabilities

Written by Marc Nimmerrichter on 31.10.202412.11.2024

On October 26, 2024, our colleague Wolfgang Ettlinger presented an eye-opening talk at BSides Berlin titled, "Can an Attacker with Full Control Over a UPS's ...

Read More
Cyber ​​Resilience Act passed

Cyber ​​Resilience Act passed

Written by Markus Hefler on 17.10.202421.11.2024

The Cyber ​​Resilience Act (CRA) is an EU regulation for security in hardware and software products with digital elements, which was adopted by the Council of the Eur ...

Read More
Yvonne Bauer elected to the Women4Cyber ​​Board

Yvonne Bauer elected to the Women4Cyber ​​Board

Written by Marc Nimmerrichter on 01.10.202401.10.2024

We are extremely pleased to announce that our employee Yvonne was recently elected to the board of Women4Cyber ​​Austria! Women4Cyber ​​is a non-profit organis ...

Read More
Certitude at the 26th OpenShift Community Meetup

Certitude at the 26th OpenShift Community Meetup

Written by Marc Nimmerrichter on 12.09.202412.09.2024

We were very pleased with the good exchange at the 26th OpenShift user meeting on September 10, 2024! Together with Michael Hauenschild and Edvin Seferovic from the ...

Read More
Exploring Anti-Phishing Measures in Microsoft 365

Exploring Anti-Phishing Measures in Microsoft 365

Written by William Moody on 07.08.202413.02.2025

In this post we will explore some of the anti-phishing measures employed by Microsoft 365 (formally Office 365) as well as their weaknesses. Certitude was able to ...

Read More
Credential Disclosure in LastPass

Credential Disclosure in LastPass

Written by Wolfgang Ettlinger on 31.07.202431.07.2024

LastPass was susceptible to a clickjacking attack. By intercepting traffic, an attacker would have been able to harvest login credentials of LastPass users. LastPass ...

Read More
Crowdstrike debacle: How do we protect ourselves?

Crowdstrike debacle: How do we protect ourselves?

Written by Florian Schweitzer on 23.07.202404.11.2024

Source: https://commons.wikimedia.org/wiki/File:Blue_screen_of_death_on_a_Dell_laptop.jpg (cropped) Last Friday, a faulty software update to the anti-malware ...

Read More
HIPAA, how your company becomes compliant

HIPAA, how your company becomes compliant

Written by Peter Aufner on 09.07.202410.07.2024

Companies that work with US health data must be “HIPAA compliant.” This is not limited to those based in the USA, but to all companies and subcontractors that come ...

Read More
CERTITUDE @ Austrian Platform Engineering Community

CERTITUDE @ Austrian Platform Engineering Community

Written by Alexander Hurbean on 16.05.202411.07.2024

As in previous years, the "Austrian Platform Engineering Community" event took place on May 16, 2024, at the BRZ. The one-day event, organized in cooperation with ...

Read More
Key-Facts NIS2 draft law

Key-Facts NIS2 draft law

Written by Marc Nimmerrichter on 04.04.202404.04.2024

Summary of the Austrian national NIS2 draft law from 03.04.2024 This article is only available in ...

Read More
ISMS for industry based on IEC 62443

ISMS for industry based on IEC 62443

Written by Günter Kahr on 25.03.202409.01.2025

Requirements from NIS2 (critical infrastructures) for manufacturing companies and operators of essential services as well as specific requirements for information ...

Read More
Skynet wants your Passwords! – Defending Against AI-Driven Social Engineering Attacks

Skynet wants your Passwords! – Defending Against AI-Driven Social Engineering Attacks

Written by Alexander Hurbean on 20.12.202320.12.2023

This second installment in our series takes a fresh look at defenses against social engineering that leverage AI technology. As we delve into strategies for both ...

Read More
DORA Regulation Update: Introducing the 2nd batch of RTS & ITS

DORA Regulation Update: Introducing the 2nd batch of RTS & ITS

Written by Thomas Fischer on 15.12.202315.12.2023

On the 8 of December 2023 the second batch of RTS (Regulatory Technical Standards) & ITS (Implementation Technical Standards) was released. These documents ...

Read More
CERTITUDE @ DEEPSEC 2023

CERTITUDE @ DEEPSEC 2023

Written by Alexander Hurbean on 20.11.202327.05.2024

Alexander Hurbean and Wolfgang Ettlinger @ Deepsec 2023© DeepSec - Joanna Pianka The latest DeepSec security conference brought great minds together again from the ...

Read More
Using Cloudflare to bypass Cloudflare

Using Cloudflare to bypass Cloudflare

Written by Stefan Proksch on 28.09.202305.10.2023

Cloudflare customer-configured protection mechanisms (e.g., Firewall, DDoS prevention) for websites can be bypassed due to gaps in cross-tenant security controls ...

Read More
Red Hat | CERTITUDE – OpenShift Security

Red Hat | CERTITUDE – OpenShift Security

Written by Alexander Hurbean on 21.09.202311.07.2024

On September 21st 2023, Certitude and Red Hat jointly held a webinar on the topic of OpenShift security. In the webinar titled "Wie OpenShift die häufigsten ...

Read More
Thousands of Organizations Vulnerable to Subdomain Hijacking

Thousands of Organizations Vulnerable to Subdomain Hijacking

Written by Florian Schweitzer on 30.08.202331.08.2023

Subdomain Hijacking presents a concerning scenario where attackers take control of websites hosted on subdomains owned by reputable organizations, enabling them to ...

Read More
Skynet wants your Passwords! – AI and Social Engineering

Skynet wants your Passwords! – AI and Social Engineering

Written by Alexander Hurbean on 25.08.202320.12.2023

As we explore the capabilities of modern AI in assisting us across both our personal and professional lives, malicious actors too are investigating its potential uses ...

Read More
Privilege Escalation in IBM Spectrum Virtualize

Privilege Escalation in IBM Spectrum Virtualize

Written by Wolfgang Ettlinger on 17.08.202317.08.2023

During a very short security test, Certitude identified two vulnerabilities in the firmware of IBM Spectrum Virtualize, a storage solution by IBM. One of these ...

Read More
Skynet wants your Passwords! @ WeAreDevelopers

Skynet wants your Passwords! @ WeAreDevelopers

Written by Natalie Müller on 09.08.202320.12.2023

The WeAreDevelopers World Congress is regarded by many as Europe's flagship conference for developers and brings together an impressive community of software and ...

Read More
Election manipulation possible – SPÖ member survey vulnerable to hackers

Election manipulation possible – SPÖ member survey vulnerable to hackers

Written by Marc Nimmerrichter on 11.05.202310.05.2023

This article is only available in ...

Read More
Increase in Online-Fraud against Accounting

Increase in Online-Fraud against Accounting

Written by Marc Nimmerrichter on 07.03.202308.03.2023

Certitude has noticed an increase in online fraud against the accounting departments of companies in Germany and Austria in the recent weeks. Attackers make customers ...

Read More
The dangers from across browser-windows

The dangers from across browser-windows

Written by Alexander Hurbean on 28.02.202328.02.2023

While browsing the web, your browser does its best to protect you along the way, but sometimes fails to do so, if not instructed properly by the website you ...

Read More
A Guide to Embedding Threat Modeling into Risk Management (Part 1)

A Guide to Embedding Threat Modeling into Risk Management (Part 1)

Written by Daniel Agota on 13.12.202213.12.2022

Overview Showing the benefits of threat modeling to management less invested in cyber security topics is notoriously hard as the added value of security, in ...

Read More
Bypassing Web Application Firewalls

Bypassing Web Application Firewalls

Written by Florian Schweitzer on 23.11.202225.11.2022

Web Application Firewalls (WAFs) are the go-to infrastructure components used to hinder attacks against web applications. What is it that WAFs really offer – can they ...

Read More
Certitude @ DeepSec 2022

Certitude @ DeepSec 2022

Written by Marc Nimmerrichter on 21.11.202221.11.2022

Last week, November 17th and 18th, the DeepSec security conference took place in the Renaissance hotel in Vienna. With more than 50 talks and workshops content was ...

Read More
Bypass phishing detections with Google Translate

Bypass phishing detections with Google Translate

Written by Giulian Guran on 01.08.202217.08.2022

A new wave of phishing is currently circulating (a related story from derstandard.at newspaper can be found here). Documents are said to have been sent to you from a ...

Read More
Kubernetes Security @ WeAreDevelopers

Kubernetes Security @ WeAreDevelopers

Written by Marc Nimmerrichter on 08.07.202227.10.2022

The WeAreDevelopers World Congress is considered by many as Europe's flagship event for developers, bringing together an amazing community from software and ...

Read More
Novelties of NIS2

Novelties of NIS2

Written by Alice Rossi on 30.06.202204.07.2022

The Network and Information Security (NIS) Directive is the first EU-wide piece of cybersecurity legislation, whose primary  objective is to achieve a high common ...

Read More
Kubernetes Security @ DeepSec Vienna 2021

Kubernetes Security @ DeepSec Vienna 2021

Written by Anita Lukic on 07.02.202224.02.2022

On 18th and 19th of November 2021, the DeepSec security conference took place in Vienna to bring together the world's most renowned security professionals from ...

Read More
Ransomware Actor May Have Leaked Their Previous Victims

Ransomware Actor May Have Leaked Their Previous Victims

Written by Roman Ferdigg on 12.01.202212.01.2022

Recently we were tasked with investigating a ransomware attack case. We were able to reconstruct the likely attack vector and identify the data that was likely stolen ...

Read More
HTTP Header Injection in Citrix ADC and Citrix Gateway (CVE-2020-8300, CVE-2021-22927)

HTTP Header Injection in Citrix ADC and Citrix Gateway (CVE-2020-8300, CVE-2021-22927)

Written by Wolfgang Ettlinger on 30.11.202130.11.2021

We have discovered a vulnerability in Citrix products (Citrix ADC and Citrix Gateway) that allows an attacker to conduct header injection attacks. This would have ...

Read More
Unpatched Exchange servers distribute phishing links (squirrelwaffle)

Unpatched Exchange servers distribute phishing links (squirrelwaffle)

Written by Peter Wagner on 29.11.202129.11.2021

Beginning of November a customer reached out to us. Internal and external users reported suspicious mails sent from their mail accounts, which included suspicious ...

Read More
The Invisible JavaScript Backdoor

The Invisible JavaScript Backdoor

Written by Wolfgang Ettlinger on 09.11.202119.01.2022

A few months ago we saw a post on the r/programminghorror subreddit: A developer describes the struggle of identifying a syntax error resulting from an invisible ...

Read More
RCE in GridPro Request Management for Windows Azure Pack (CVE-2021-40371)

RCE in GridPro Request Management for Windows Azure Pack (CVE-2021-40371)

Written by Giulian Guran on 21.10.202121.10.2021

We recently discovered a vulnerability in GridPro Request Management versions <=2.0.7905 for Windows Azure Pack by GridPro Software. The vulnerability was ...

Read More
Citrix ADC & Citrix Gateway Vulnerability CVE-2020-8300

Citrix ADC & Citrix Gateway Vulnerability CVE-2020-8300

Written by Wolfgang Ettlinger on 09.06.202130.11.2021

Update: Details regarding this vulnerability can be found here: https://certitude.consulting/blog/en/citrix-header-injection-2/ We have identified an issue in ...

Read More
DP API encryption ineffective in Windows containers: Publicly Available Cryptographic Keys (CVE-2021-1645)

DP API encryption ineffective in Windows containers: Publicly Available Cryptographic Keys (CVE-2021-1645)

Written by Marc Nimmerrichter on 16.03.202118.05.2021

We recently discovered a vulnerability in the DP API key management of Windows containers. This vulnerability was assigned CVE-2021-1645 by Microsoft [1] and ...

Read More
CSRF in JSF 2.0: Predicting CSRF Tokens for Apache MyFaces

CSRF in JSF 2.0: Predicting CSRF Tokens for Apache MyFaces

Written by Wolfgang Ettlinger on 19.02.202118.05.2021

JavaServer Faces (JSF) is a commonly used server-side web framework. Developers appreciate its relative ease of use while security engineers appreciate its ready-made ...

Read More
WKO-Interview: Focus on Cyber Security

WKO-Interview: Focus on Cyber Security

Written by Natalie Müller on 23.04.202507.05.2025

Cybersecurity in focus at the WKO expert interview with Markus Helfer from Certitude Consulting GmbH and Walter Glanninger from the Lower Austrian Chamber of ...

Read More
CVE-2025-25599: A Cautionary Tale of Insecure Temporary Files

CVE-2025-25599: A Cautionary Tale of Insecure Temporary Files

Written by William Moody on 13.03.202513.03.2025

During a security assessment of Bolt, an open-source content management system, it was discovered that temporary files are used insecurely when uploading an avatar ...

Read More
Die Presse – March 13th, 2025

Die Presse – March 13th, 2025

Written by Natalie Müller on 13.03.202517.03.2025

Marc Nimmerrichter, Managing Partner at Certitude, warns in an article by "Die Presse" of March 13, 2025, against Europe's excessive dependence on the US cloud ...

Read More

Posts navigation

Older

Categories

  • Career
  • Compliance
  • Conferences
  • Expertise
  • Incident Response
  • Press
  • Press Release
  • Security Strategy
  • Technical Analysis
  • Uncategorized
  • Vulnerability Research

Archives

  • April 2025
  • March 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • June 2023
  • May 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • June 2020
  • March 2020
  • February 2020
  • January 2020
  • November 2019
  • October 2019
  • September 2019

Follow us on Twitter: @certitude_lab & @cert_it_ude

Certitude Blog

Certitude Consulting GmbH

Barichgasse 40-42 1030 Vienna

  • Services
  • About Us
  • Career
  • Privacy statement
  • Legal Notice
  • Imprint
  • Contact
  • LinkedIn

© 2020 Certitude Consulting GmbH