Companies operate under a “false sense of security,” warn the BSI and TÜV. This may sound surprising given the persistent threats. However, it is backed up by a recent study on cyber security in companies. Many companies underestimate the situation, overestimate their own capabilities, and fail to take sufficient protective measures. These and other findings […]
https://www.greenbone.net/wp-content/uploads/Gb_New-logo_horizontal_head.png00Markus Feilnerhttps://www.greenbone.net/wp-content/uploads/Gb_New-logo_horizontal_head.pngMarkus Feilner2025-06-25 10:35:552025-06-25 10:35:55TÜV Study on Cyber Security: German Companies Still Under Pressure
May 2025 was a volcanic month for cybersecurity news, including several large breaches and new critical severity vulnerabilities. The Greenbone blog has already covered some major events, such as new actively exploited vulnerabilities in SAP Netweaver, Commvault Command Center and Ivanti EPMM. In total 4,014 new vulnerabilities were added to MITRE’s CVE (Common Vulnerabilities and […]
Microsoft Windows remains the most widely used desktop operating system in enterprise environments – and also one of the most targeted by threat actors. Insecure configurations are a leading source of security breaches [1][2][3], often exploited to gain initial access [TA0001], escalate privileges [TA0004], steal credentials [TA0006], establish persistent access [TA0003], and move laterally within […]
https://www.greenbone.net/wp-content/uploads/Gb_New-logo_horizontal_head.png00Greenbone AGhttps://www.greenbone.net/wp-content/uploads/Gb_New-logo_horizontal_head.pngGreenbone AG2025-06-02 13:21:082025-06-05 09:24:41Greenbone Audits for Compliance with the CIS Windows 11 Enterprise Benchmark”
TÜV Study on Cyber Security: German Companies Still Under Pressure
BlogCompanies operate under a “false sense of security,” warn the BSI and TÜV. This may sound surprising given the persistent threats. However, it is backed up by a recent study on cyber security in companies. Many companies underestimate the situation, overestimate their own capabilities, and fail to take sufficient protective measures. These and other findings […]
Threat Report May 2025: Hack, Rinse, Repeat
BlogMay 2025 was a volcanic month for cybersecurity news, including several large breaches and new critical severity vulnerabilities. The Greenbone blog has already covered some major events, such as new actively exploited vulnerabilities in SAP Netweaver, Commvault Command Center and Ivanti EPMM. In total 4,014 new vulnerabilities were added to MITRE’s CVE (Common Vulnerabilities and […]
Greenbone Audits for Compliance with the CIS Windows 11 Enterprise Benchmark”
BlogMicrosoft Windows remains the most widely used desktop operating system in enterprise environments – and also one of the most targeted by threat actors. Insecure configurations are a leading source of security breaches [1][2][3], often exploited to gain initial access [TA0001], escalate privileges [TA0004], steal credentials [TA0006], establish persistent access [TA0003], and move laterally within […]