The powerful PowerShell, which is preinstalled in all Windows systems, is generally available as a useful aid for administrators or for automation. Due to the many possible uses, hackers have also discovered PowerShell as an attack vector and have made extensive use of it in recent years. In order to detect such attacks, PowerShell activities of all Windows systems (clients and servers) should be centrally logged and monitored. The whitepaper comprehensively describes the options for monitoring and logging. (in German)



State of the art

As part of our membership in TeleTrusT we participated in the “state of the art” working group in developing recommendations for action. The working group has summarized the “state of the art” for the relevant systems, components and processes within the meaning of the IT Security Act in one handout. The document provides specific information and recommendations for action. (in German)




Our partner contribution for the Cybersecurity Alliance deals with the Shellshock vulnerability, a family of vulnerabilities in the GNU Bash Shell, the command line interpreter of Unix-like operating systems such as Linux. Originally only the “Bashdoor” security hole discovered on September 12, 2014 was named.

In the article we first deal with the shell shock problem on Windows systems and then on Unix / Linux systems. (in German)


ACS – Homepage of the Alliance for Cyber Security – CCVossel: Shellshock – The security gap also under Windows (allianz-fuer-cybersicherheit.de)

Cookie Consent with Real Cookie Banner