Skip to content
Lars Hilse – Cyber Incident Response // Cyber Security // Cybercrime // Cyber Terrorism // Cyber Defense

Lars Hilse – Cyber Incident Response // Cyber Security // Cybercrime // Cyber Terrorism // Cyber Defense

Cyber Incident Response // Cyber Security // Cyber Crime // Cyber Terrorism // Cyber Defense

  • Project ACRAC: Advanced Cybersecurity Risk Assessment Checklist
  • What I do

Tag: vulnerability

What’s the difference between risk, vulnerability, and threat in cyber security?

November 9, 2018November 7, 2018 ~ larshilse ~ Leave a comment

Differentiating the terms risk, vulnerability, and threat is quite difficult in a cyber security setting. This post intends to give a clear outline.

How do you handle antivirus alerts

November 9, 2018 ~ larshilse ~ Leave a comment

Antivirus incidents are quite common. But there are special, and effective ways to handle them.

The most complex case of CEO Fraud… yet; and how to mitigate it.

October 30, 2018October 30, 2018 ~ larshilse ~ Leave a comment

CEO fraud is one of the most devious forms of cybercrime, and social engineering. The most complex form was experienced, and the risk for future attacks was mitigated.

Why it’s a good idea to isolate EOL applications/software with insufficient patches, and how to do it

October 30, 2018October 30, 2018 ~ larshilse ~ Leave a comment

Software that it’s not regularly updated presents at risk. However, sometimes it is out of our influence whether or not a software remains up to date. If the software vendor does not provide updates and patches in time, and option to deal with such situations is to isolate software in virtual machines etc.

About this Blog

These are my opinions on #CyberSecurity, #Cybercrime, #CyberTerrorism, #CyberDefense, et al.

I publish using dictation tools; find a typo? You’re welcome to keep it.

My publications, appearances, projects, etc. can be here on TOR: http://larshilse3xpyawo.onion/ ; if you can’t use TOR, use this link through the clear web: https://larshilse3xpyawo.tor2web.xyz

Contact

Email: [email protected] PGP: 44D5 68A1 32A1 AD87 3E29 2AA2 9B4A 1674 17FF C660

Phone: +49 (0)4835 9513027

Please use my full name in the “To” line with my email address, as this will make your message look less like spam. This will happen automatically if you have me in your address book. If you just type in my email address, I probably won’t see your mail.

Recent Posts

  • So, What’s This Usability vs. Security Kerfuffle All About Then? A Summary, If You Must.
  • Corporate Eavesdropping: Why This Isn’t Just an “IT Problem”
  • The Malicious Insider: and why you should loose sleep over him
  • Socio-Technical Cybersecurity – The Human Clusterfuck in Cybersecurity and why Your Firewall Won’t Save You When Karen Clicks a Phishing Link
  • China’s Drone Warfare Advances: A Bloody Game-Changer for Global Security

Archives

  • May 2025
  • April 2025
  • December 2022
  • March 2020
  • October 2019
  • June 2019
  • May 2019
  • February 2019
  • November 2018
  • October 2018
  • July 2018

Categories

  • ACRAC (16)
  • Application security (9)
  • ceo fraud (4)
  • corporate risks (2)
  • crytocurrency (1)
  • cyber crime (18)
  • cyber defence (3)
  • cyber security (24)
  • cyber terrorism (2)
  • dark web (3)
  • digital ethics (7)
  • global risks (24)
  • infosec reader questions (6)
  • privacy (11)
  • risk management (37)
  • social engineering (4)
  • Uncategorized (4)
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
Proudly powered by WordPress ~ Theme: Penscratch 2 by WordPress.com.