<?xml version="1.0" encoding="utf-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
	<channel>
		<atom:link href="https://www.gdatasoftware.com/blogrss.xml" rel="self" type="application/rss+xml"/>
		<title>Security Blog G Data Software AG</title>
		<link>https://www.gdatasoftware.com/blog</link>
		<description></description>
		<language>de</language>
		
		<pubDate>Thu, 21 May 2026 09:17:06 +0200</pubDate>
		<lastBuildDate>Thu, 21 May 2026 09:17:06 +0200</lastBuildDate>
		
		<generator>G DATA CyberDefense AG</generator>
		
			
				<item>
					<pubDate>Mon, 18 May 2026 09:57:00 +0200</pubDate>
					<title><![CDATA[An AI-generated phishing attack on myself: How Cybercriminals Use ChatGPT and Similar Tools]]></title>
					<link>https://blog.gdatasoftware.com/2026/05/38388-ki-phishing-chatgpt</link>
					<guid>https://blog.gdatasoftware.com/2026/05/38388-ki-phishing-chatgpt</guid>
					<description><![CDATA[A phishing attack that is frighteningly well tailored to me. The tone is right, the context fits, and details from my professional environment are correctly referenced. For a brief moment, everything appears credible. But I ask myself: Where does this information about me come from? And how was the attacker able to target me so precisely? This is no coincidence. Phishing attacks no longer rely on mass distribution but on carefully prepared deception. With the help of artificial intelligence, cybercriminals analyze publicly available information, create personality profiles, and use appropriate triggers. In this article, I show how such an attack is created.]]></description>
                    <enclosure length="0" type="image/png" url="https://blog.gdatasoftware.com/fileadmin/_processed_/e/a/Phishing_mit_ChatGPT_Illu-ChatGPT_7a0c8aacd6.png"/>
				</item>
			
				<item>
					<pubDate>Tue, 05 May 2026 09:55:00 +0200</pubDate>
					<title><![CDATA[Municipalities in the Crosshairs: “They Are Easy Prey for Cybercriminals”]]></title>
					<link>https://blog.gdatasoftware.com/2026/05/38348-cyberangriffe-kommunen</link>
					<guid>https://blog.gdatasoftware.com/2026/05/38348-cyberangriffe-kommunen</guid>
					<description><![CDATA[Potsdam, Rügen, and Schwerte – three municipalities with one thing in common: they have all been victims of cyberattacks, in some cases with severe consequences. In this interview, Kira Groß-Bölting and Jan Leitzgen from the G DATA CSIRT (Computer Security Incident Response Team) explain why cybercriminals target municipalities and how cities and districts can effectively protect their IT despite a shortage of skilled personnel.]]></description>
                    <enclosure length="0" type="image/jpeg" url="https://blog.gdatasoftware.com/fileadmin/_processed_/2/a/G_DATA_Security_Feuermelder_2c462b9ce5.jpg"/>
				</item>
			
				<item>
					<pubDate>Tue, 28 Apr 2026 09:00:00 +0200</pubDate>
					<title><![CDATA[“G DATA’s Security Awareness trainings have significantly increased security awareness at HBC-radiomatic”]]></title>
					<link>https://blog.gdatasoftware.com/2026/04/38418-security-awareness-trainings-hbc-radiomatic</link>
					<guid>https://blog.gdatasoftware.com/2026/04/38418-security-awareness-trainings-hbc-radiomatic</guid>
					<description><![CDATA[As a globally leading manufacturer of industrial radio control systems, HBC-radiomatic has firmly embedded security awareness into its corporate culture. In this interview, Soenke Knipp, Head of IT at HBC-radiomatic, explains why the long-established company from Crailsheim in Baden-Württemberg chose the practical training courses offered by G DATA CyberDefense—and how these trainings enhance employee awareness.]]></description>
                    <enclosure length="0" type="image/jpeg" url="https://blog.gdatasoftware.com/fileadmin/_processed_/4/4/2109_Maehraupe_an_der_Boeschung_6a59fded05.jpg"/>
				</item>
			
				<item>
					<pubDate>Thu, 23 Apr 2026 12:05:00 +0200</pubDate>
					<title><![CDATA[NIS-2 in Practice: How a Managed SOC Supports Compliance with Regulatory Requirements]]></title>
					<link>https://blog.gdatasoftware.com/2026/04/38413-how-a-managed-soc-supports-compliance-with-regulatory-requirements</link>
					<guid>https://blog.gdatasoftware.com/2026/04/38413-how-a-managed-soc-supports-compliance-with-regulatory-requirements</guid>
					<description><![CDATA[Implementing the requirements of the NIS 2 Directive involves more than just introducing new tools: it requires effective processes, continuous monitoring of IT systems, and specialized IT security expertise. This is precisely where the challenge lies for many companies. A Managed Security Operations Center (SOC) can help implement the required measures and is a key component of any IT security strategy.]]></description>
                    <enclosure length="0" type="image/jpeg" url="https://blog.gdatasoftware.com/fileadmin/_processed_/0/2/G_DATA_Blog_NIS2-SOC_Title_148ba3e43e.jpg"/>
				</item>
			
				<item>
					<pubDate>Thu, 23 Apr 2026 09:00:00 +0200</pubDate>
					<title><![CDATA[Fake Document, Real Access: Foxit Impersonation Enables Stealth VNC Control]]></title>
					<link>https://blog.gdatasoftware.com/2026/04/38409-fake-foxit-vnc</link>
					<guid>https://blog.gdatasoftware.com/2026/04/38409-fake-foxit-vnc</guid>
					<description><![CDATA[Attackers who impersonate trusted vendors do not only damage the reputation of the original vendor, but also cause heaps of trouble down the line. ]]></description>
                    <enclosure length="0" type="image/jpeg" url="https://blog.gdatasoftware.com/fileadmin/_processed_/3/f/G_DATA_Blog_FakeFoxit_Title_46a174d94c.jpg"/>
				</item>
			
				<item>
					<pubDate>Fri, 17 Apr 2026 08:00:00 +0200</pubDate>
					<title><![CDATA[Claude Mythos: Dangers and rewards, right next to each other]]></title>
					<link>https://blog.gdatasoftware.com/2026/04/38408-anthropic-claude-mythos-risks</link>
					<guid>https://blog.gdatasoftware.com/2026/04/38408-anthropic-claude-mythos-risks</guid>
					<description><![CDATA[A lot has already been written about Anthropic’s “Mythos.” While some welcome it and embrace the new possibilities, others are heralding the end of cybersecurity. The truth lies somewhere in between.]]></description>
                    <enclosure length="0" type="image/jpeg" url="https://blog.gdatasoftware.com/fileadmin/_processed_/0/2/G_DATA_Blog_ClaudeMythos_DE_Title_8788200ced.jpg"/>
				</item>
			
				<item>
					<pubDate>Thu, 16 Apr 2026 09:08:00 +0200</pubDate>
					<title><![CDATA[“Implementing NIS-2 is an organizational stress test”]]></title>
					<link>https://blog.gdatasoftware.com/2026/04/38406-implementing-nis-2</link>
					<guid>https://blog.gdatasoftware.com/2026/04/38406-implementing-nis-2</guid>
					<description><![CDATA[Many companies still do not fully have NIS-2 on their radar. Yet it is no longer just about a registration requirement. In this interview, Dr. Matthias Zuchowski, regulatory expert at G DATA CyberDefense, explains what companies need to do now, where typical pitfalls lie, and how the requirements can be implemented pragmatically.]]></description>
                    <enclosure length="0" type="image/jpeg" url="https://blog.gdatasoftware.com/fileadmin/_processed_/6/4/G_DATA_NIS-2_Visual_V1_CMYK_0ec4b96bee.jpg"/>
				</item>
			
				<item>
					<pubDate>Mon, 13 Apr 2026 11:03:00 +0200</pubDate>
					<title><![CDATA["Pics or it didnt happen" - What BlueHammer tells us about Vulnerability Disclosure]]></title>
					<link>https://blog.gdatasoftware.com/2026/04/38404-bluehammer-vulnerability-disclosure</link>
					<guid>https://blog.gdatasoftware.com/2026/04/38404-bluehammer-vulnerability-disclosure</guid>
					<description><![CDATA[Last week, reports circulated about an unpatched security vulnerability in Microsoft Windows. The “BlueHammer” 0-day vulnerability allows a normal user to gain system-level privileges. Microsoft allegedly refused to accept a report about the vulnerability—because video proof was missing.]]></description>
                    <enclosure length="0" type="image/jpeg" url="https://blog.gdatasoftware.com/fileadmin/_processed_/7/0/G_DATA_Blog_Bluehammer_Title_76a36708f1.jpg"/>
				</item>
			
				<item>
					<pubDate>Thu, 09 Apr 2026 09:25:00 +0200</pubDate>
					<title><![CDATA[Security Awareness: Why employees are essential for IT security]]></title>
					<link>https://blog.gdatasoftware.com/2026/04/38392-security-awareness-employees-are-essential</link>
					<guid>https://blog.gdatasoftware.com/2026/04/38392-security-awareness-employees-are-essential</guid>
					<description><![CDATA[Technical protection measures are only half the battle. In this interview, Frank Queißer from Cyber Samurai explains why security awareness is a crucial component of modern IT security, how companies can identify knowledge gaps among employees, and why realistic training leads to long-term improvements in security.]]></description>
                    <enclosure length="0" type="image/jpeg" url="https://blog.gdatasoftware.com/fileadmin/_processed_/3/d/GDATA-CDA-Image-3-CMYK-300dpi_ddbf7e31ea.jpg"/>
				</item>
			
				<item>
					<pubDate>Tue, 31 Mar 2026 09:35:00 +0200</pubDate>
					<title><![CDATA[Phishing SMS: How to Recognize Fraudulent Messages and Protect Yourself Effectively]]></title>
					<link>https://blog.gdatasoftware.com/2026/03/38401-phishing-sms-how-to-recognize-and-protect</link>
					<guid>https://blog.gdatasoftware.com/2026/03/38401-phishing-sms-how-to-recognize-and-protect</guid>
					<description><![CDATA[A short message pops up: a supposed SMS from a delivery service announces a package, a warning from your bank urges you to immediately confirm your account details, or a supposed friend reaches out from a new number. These text messages, known as “smishing” (a combination of SMS and phishing), are far more than just spam.]]></description>
                    <enclosure length="0" type="image/jpeg" url="https://blog.gdatasoftware.com/fileadmin/_processed_/3/6/G_DATA_Blog_Phone2019_Preview_7ea1791254.jpg"/>
				</item>
			
		
	</channel>
</rss>