What is Phishing?
The word phishing is a combination of the English words for “password” and “fishing/fishing” (Password+Fishing = Phishing). It describes a common tactic used by cybercriminals to achieve a specific goal. This target can - as the name suggests - be a user's access data. But other information such as credit card numbers and the like could also be the target. A (successful) phishing attack is often the beginning of, among other things, ransomware attacks.
In the context of companies, so-called spear phishing attacks are being carried out more and more
frequently. Here, employees of a company are specifically contacted in order to obtain sensitive
information. The attackers pose as trustworthy people in order to deceive employees. The attackers
often use information from social networks to deceive employees.
The more an attacker knows about his target, the more sophisticated attacks of this type could be. Especially in connection with GenAI/LLM, very real emails can be prepared quickly, which unfortunately are often not recognized as problems.
The victim clicks on a link, gets ransomware on the (company) computer or enters their access data on a supposedly trustworthy site.
Our platform "Argos" is able to monitor your entire external infrastructure non-stop - so you and we can quickly identify potential problems. The platform looks for and reports anomalies to us.
Red teaming combines all IT security disciplines to achieve a defined goal. If you are confident that your infrastructure and applications are secure, red teaming is a solid tool to ensure they stay that way.
Too often we are part of highly complex technical penetration tests, but these do not prevent employee data from being leaked on the Internet for the portal being tested. As a customer you should know about it!
What clients say about us
„I've been really impressed with DSecured. The results they delivered exceeded our expectations. They found a wide range of IT problems and severe vulnerabilities and always communicated clearly. Working with them has been straightforward and reassuring.“
„The security of our customers’ data is our top priority. Thanks to DSecured, we were able to improve the resilience of our systems and realize how important the topic of "Shadow IT" is. The commitment of the team and their skills made the crucial difference for us.“
„DSecured was able to discover a surprising number of previously undetected security gaps in our infrastructure. The Argos platform as well as classic penetration tests were used for this. We really appreciated the honest advice on the subject of IT security and automation and would like to thank Mr. Strobel for this.“
„Mr. Strobel and his team regularly carry out penetration tests against our automation platform - and always find what they are looking for. The results are presented clearly and reproducibly. Communication has so far taken place via short channels, for example via Slack. We can definitely recommend DSecured.“