<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="https://feeds.feedblitz.com/feedblitz_rss.xslt"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0">
	<channel>
		<atom:link href="https://www.gdatasoftware.com/blogrss.xml" rel="self" type="application/rss+xml" />
		<title>G Data SecurityBlog (english)</title>
		<link>https://www.gdatasoftware.com/blog</link>
		<description>Security Blog</description>
		<language>de</language>
		
		<pubDate>Tue, 12 Apr 2022 14:46:58 +0200</pubDate>
		<lastBuildDate>Tue, 12 Apr 2022 14:46:58 +0200</lastBuildDate>
		
		<generator>G DATA CyberDefense AG</generator>
<image>
	<url>https://users.feedblitz.com/f3a77257c317a5341708a6bc585e8faa/Logo%202015%204C%20RGB.png</url>
	<title>G Data SecurityBlog (english)</title>
	<link>https://www.gdatasoftware.com/blog</link>
</image>
<meta xmlns="http://www.w3.org/1999/xhtml" name="robots" content="noindex" />
<item>
<feedburner:origLink>https://www.gdatasoftware.com/blog/2022/04/phone-scams</feedburner:origLink>
					<pubDate>Thu, 07 Apr 2022 10:00:00 +0200</pubDate>
					<title><![CDATA[Phone Scams: Are you still using your phone for phone calls?]]></title>
					<link>https://feeds.feedblitz.com/~/690910062/0/gdatasecurityblog-en~Phone-Scams-Are-you-still-using-your-phone-for-phone-calls</link>
					<guid>https://www.gdatasoftware.com/blog/2022/04/phone-scams</guid>
					<description><![CDATA[It seems that the number of complaints concerning phone scams is increasing. Let’s try to identify a number of frequently occurring fraudulent practices. What can you do to stop those annoying phone scams? <div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/1/d/G_DATA_Blog_FraudCalls_Preview_44ed0073d6.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/1/d/G_DATA_Blog_FraudCalls_Preview_44ed0073d6.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/690910062/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/690910062/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/690910062/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/690910062/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/690910062/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/1/d/G_DATA_Blog_FraudCalls_Preview_44ed0073d6.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>It seems that the number of complaints concerning phone scams is increasing. Let’s try to identify a number of frequently occurring fraudulent practices. What can you do to stop those annoying phone scams?</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/690910062/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/1/d/G_DATA_Blog_FraudCalls_Preview_44ed0073d6.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/1/d/G_DATA_Blog_FraudCalls_Preview_44ed0073d6.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/690910062/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/690910062/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/690910062/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/690910062/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/690910062/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://www.gdatasoftware.com/blog/2022/03/ukraine-war-consequences-for-companies</feedburner:origLink>
					<pubDate>Fri, 11 Mar 2022 13:52:00 +0100</pubDate>
					<title><![CDATA[War in Ukraine: What are the consequences for companies?]]></title>
					<link>https://feeds.feedblitz.com/~/686478334/0/gdatasecurityblog-en~War-in-Ukraine-What-are-the-consequences-for-companies</link>
					<guid>https://www.gdatasoftware.com/blog/2022/03/ukraine-war-consequences-for-companies</guid>
					<description><![CDATA[The uncertainty surrounding the armed conflict in Ukraine also raises numerous questions: How can companies protect themselves from getting caught between the fronts and becoming a target? There is only one thing that is certain: There are currently more questions than answers.<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/3/4/G_DATA_Blog_Ukraine_Unsicherheit_Preview_92ff3df926.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/3/4/G_DATA_Blog_Ukraine_Unsicherheit_Preview_92ff3df926.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/686478334/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/686478334/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/686478334/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/686478334/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/686478334/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/3/4/G_DATA_Blog_Ukraine_Unsicherheit_Preview_92ff3df926.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>The uncertainty surrounding the armed conflict in Ukraine also raises numerous questions: How can companies protect themselves from getting caught between the fronts and becoming a target? There is only one thing that is certain: There are currently more questions than answers.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/686478334/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/3/4/G_DATA_Blog_Ukraine_Unsicherheit_Preview_92ff3df926.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/3/4/G_DATA_Blog_Ukraine_Unsicherheit_Preview_92ff3df926.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/686478334/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/686478334/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/686478334/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/686478334/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/686478334/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://www.gdatasoftware.com/blog/2022/02/37248-living-off-the-land</feedburner:origLink>
					<pubDate>Tue, 08 Mar 2022 10:11:00 +0100</pubDate>
					<title><![CDATA[An attacker's toolchest: Living off the land]]></title>
					<link>https://feeds.feedblitz.com/~/685149666/0/gdatasecurityblog-en~An-attackers-toolchest-Living-off-the-land</link>
					<guid>https://www.gdatasoftware.com/blog/2022/02/37248-living-off-the-land</guid>
					<description><![CDATA[If you’ve been keeping up with the information security world, you’ve certainly heard that recent ransomware attacks and other advanced persistent threats are sometimes using special kind of tools. But for the most part, the tools will be very familiar to you.<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/a/5/G_DATA_Blog_Tools_LivingOffTheLand_Preview_89be1858c7.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/a/5/G_DATA_Blog_Tools_LivingOffTheLand_Preview_89be1858c7.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/685149666/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/685149666/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/685149666/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/685149666/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/685149666/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/a/5/G_DATA_Blog_Tools_LivingOffTheLand_Preview_89be1858c7.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>If you’ve been keeping up with the information security world, you’ve certainly heard that recent ransomware attacks and other advanced persistent threats are sometimes using special kind of tools. But for the most part, the tools will be very familiar to you.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/685149666/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/a/5/G_DATA_Blog_Tools_LivingOffTheLand_Preview_89be1858c7.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/a/5/G_DATA_Blog_Tools_LivingOffTheLand_Preview_89be1858c7.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/685149666/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/685149666/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/685149666/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/685149666/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/685149666/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://www.gdatasoftware.com/blog/2022/02/37238-smartvmi</feedburner:origLink>
					<pubDate>Wed, 02 Mar 2022 13:00:00 +0100</pubDate>
					<title><![CDATA[Research Project: SmartVMI]]></title>
					<link>https://feeds.feedblitz.com/~/684461492/0/gdatasecurityblog-en~Research-Project-SmartVMI</link>
					<guid>https://www.gdatasoftware.com/blog/2022/02/37238-smartvmi</guid>
					<description><![CDATA[SmartVMI is getting off the ground: Alongside the University of Passau and innowerk, G DATA is conducting research into improving the state of virtual machine introspection for memory analysis and malware detection. <div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/5/0/G_DATA_Blog_SmartVMI_Preview_47f9a7033a.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/5/0/G_DATA_Blog_SmartVMI_Preview_47f9a7033a.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/684461492/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/684461492/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/684461492/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/684461492/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/684461492/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/5/0/G_DATA_Blog_SmartVMI_Preview_47f9a7033a.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>SmartVMI is getting off the ground: Alongside the University of Passau and innowerk, G DATA is conducting research into improving the state of virtual machine introspection for memory analysis and malware detection.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/684461492/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/5/0/G_DATA_Blog_SmartVMI_Preview_47f9a7033a.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/5/0/G_DATA_Blog_SmartVMI_Preview_47f9a7033a.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/684461492/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/684461492/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/684461492/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/684461492/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/684461492/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://www.gdatasoftware.com/blog/2022/02/android-malware-an-underestimated-problem</feedburner:origLink>
					<pubDate>Tue, 22 Feb 2022 10:00:00 +0100</pubDate>
					<title><![CDATA[Android Malware: An underestimated problem?]]></title>
					<link>https://feeds.feedblitz.com/~/683211320/0/gdatasecurityblog-en~Android-Malware-An-underestimated-problem</link>
					<guid>https://www.gdatasoftware.com/blog/2022/02/android-malware-an-underestimated-problem</guid>
					<description><![CDATA[Is Android malware dangerous? How can I prevent my phone from being infected? How can I remove a malicious app from my phone? What’s the real reason why we see so many malicious apps for Android? All these are questions we will look into during the next minutes.<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/1/2/G_DATA_Blog_AndroidMalware_underestimatedDanger_Preview_9e0205b9c6.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/1/2/G_DATA_Blog_AndroidMalware_underestimatedDanger_Preview_9e0205b9c6.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/683211320/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/683211320/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/683211320/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/683211320/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/683211320/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/1/2/G_DATA_Blog_AndroidMalware_underestimatedDanger_Preview_9e0205b9c6.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>Is Android malware dangerous? How can I prevent my phone from being infected? How can I remove a malicious app from my phone? What’s the real reason why we see so many malicious apps for Android? All these are questions we will look into during the next minutes.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/683211320/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/1/2/G_DATA_Blog_AndroidMalware_underestimatedDanger_Preview_9e0205b9c6.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/1/2/G_DATA_Blog_AndroidMalware_underestimatedDanger_Preview_9e0205b9c6.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/683211320/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/683211320/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/683211320/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/683211320/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/683211320/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://www.gdatasoftware.com/blog/2022/02/37239-allcome-clipbanker-is-a-newcomer-in-malware-underground-forums</feedburner:origLink>
					<pubDate>Mon, 14 Feb 2022 13:37:00 +0100</pubDate>
					<title><![CDATA[Allcome clipbanker is a newcomer in underground forums]]></title>
					<link>https://feeds.feedblitz.com/~/682195886/0/gdatasecurityblog-en~Allcome-clipbanker-is-a-newcomer-in-underground-forums</link>
					<guid>https://www.gdatasoftware.com/blog/2022/02/37239-allcome-clipbanker-is-a-newcomer-in-malware-underground-forums</guid>
					<description><![CDATA[The malware underground market might seem astoundingly professional in marketing and support. Let's take a look under the covers of one particular malware-as-a-service—the clipboard banker Allcome.<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/7/f/G_DATA_Blog_AllcomeBanker_Preview_b51c27161c.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/7/f/G_DATA_Blog_AllcomeBanker_Preview_b51c27161c.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/682195886/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/682195886/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/682195886/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/682195886/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/682195886/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/7/f/G_DATA_Blog_AllcomeBanker_Preview_b51c27161c.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>The malware underground market might seem astoundingly professional in marketing and support. Let's take a look under the covers of one particular malware-as-a-service—the clipboard banker Allcome.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/682195886/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/7/f/G_DATA_Blog_AllcomeBanker_Preview_b51c27161c.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/7/f/G_DATA_Blog_AllcomeBanker_Preview_b51c27161c.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/682195886/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/682195886/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/682195886/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/682195886/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/682195886/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://www.gdatasoftware.com/blog/2022/01/37236-qr-codes-on-twitter-deliver-malicious-chrome-extension</feedburner:origLink>
					<pubDate>Thu, 03 Feb 2022 16:20:00 +0100</pubDate>
					<title><![CDATA[QR codes on Twitter deliver malicious Chrome extension]]></title>
					<link>https://feeds.feedblitz.com/~/680718690/0/gdatasecurityblog-en~QR-codes-on-Twitter-deliver-malicious-Chrome-extension</link>
					<guid>https://www.gdatasoftware.com/blog/2022/01/37236-qr-codes-on-twitter-deliver-malicious-chrome-extension</guid>
					<description><![CDATA[ISO file downloads are advertised via QR codes on Twitter and on supposedly free gaming sites, but they don't contain what they promise.<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/0/a/G_DATA_Blog_Malware_QRCodes_Preview_8c308fd394.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/0/a/G_DATA_Blog_Malware_QRCodes_Preview_8c308fd394.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/680718690/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/680718690/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/680718690/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/680718690/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/680718690/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/0/a/G_DATA_Blog_Malware_QRCodes_Preview_8c308fd394.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>ISO file downloads are advertised via QR codes on Twitter and on supposedly free gaming sites, but they don't contain what they promise.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/680718690/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/0/a/G_DATA_Blog_Malware_QRCodes_Preview_8c308fd394.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/0/a/G_DATA_Blog_Malware_QRCodes_Preview_8c308fd394.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/680718690/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/680718690/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/680718690/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/680718690/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/680718690/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://www.gdatasoftware.com/blog/2022/01/37232-merck-wins-not-petya-claim-but-the-future-of-cybersecurity-insurance-is-complicated</feedburner:origLink>
					<pubDate>Thu, 27 Jan 2022 10:23:00 +0100</pubDate>
					<title><![CDATA[Merck wins Not Petya claim – but the future of cybersecurity insurance is complicated]]></title>
					<link>https://feeds.feedblitz.com/~/679721284/0/gdatasecurityblog-en~Merck-wins-Not-Petya-claim-%e2%80%93-but-the-future-of-cybersecurity-insurance-is-complicated</link>
					<guid>https://www.gdatasoftware.com/blog/2022/01/37232-merck-wins-not-petya-claim-but-the-future-of-cybersecurity-insurance-is-complicated</guid>
					<description><![CDATA[Pharmaceutical company Merck & Co won its case for coverage of losses incurred during the Not Petya cyberattack, securing a payment of 1.4 billion US-Dollars from its insurance company. Previously, the company withheld the money, citing exclusion policies. <div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/d/a/Security_Blog_cybersecurity_insurance_d439645caf.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/d/a/Security_Blog_cybersecurity_insurance_d439645caf.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/679721284/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/679721284/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/679721284/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/679721284/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/679721284/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/d/a/Security_Blog_cybersecurity_insurance_d439645caf.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>Pharmaceutical company Merck & Co won its case for coverage of losses incurred during the Not Petya cyberattack, securing a payment of 1.4 billion US-Dollars from its insurance company. Previously, the company withheld the money, citing exclusion policies.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/679721284/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/d/a/Security_Blog_cybersecurity_insurance_d439645caf.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/d/a/Security_Blog_cybersecurity_insurance_d439645caf.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/679721284/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/679721284/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/679721284/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/679721284/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/679721284/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://www.gdatasoftware.com/blog/2022/01/malware-vaccines</feedburner:origLink>
					<pubDate>Wed, 19 Jan 2022 13:00:00 +0100</pubDate>
					<title><![CDATA[Malware vaccines can prevent pandemics, yet are rarely used]]></title>
					<link>https://feeds.feedblitz.com/~/678606500/0/gdatasecurityblog-en~Malware-vaccines-can-prevent-pandemics-yet-are-rarely-used</link>
					<guid>https://www.gdatasoftware.com/blog/2022/01/malware-vaccines</guid>
					<description><![CDATA[Vaccines have distinct advantages over detection based defense mechanisms, so we developed a vaccine to protect from one of the most notorious ransomware families—STOP/DJVU. But unlike vaccines against biological viruses, malware vaccines are not particularly common. This article explains why.<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/9/d/G_DATA_Blog_Ransomware_Vaccine_Preview_b30b80f69c.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/9/d/G_DATA_Blog_Ransomware_Vaccine_Preview_b30b80f69c.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/678606500/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/678606500/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/678606500/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/678606500/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/678606500/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/9/d/G_DATA_Blog_Ransomware_Vaccine_Preview_b30b80f69c.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>Vaccines have distinct advantages over detection based defense mechanisms, so we developed a vaccine to protect from one of the most notorious ransomware families—STOP/DJVU. But unlike vaccines against biological viruses, malware vaccines are not particularly common. This article explains why.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/678606500/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/9/d/G_DATA_Blog_Ransomware_Vaccine_Preview_b30b80f69c.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/9/d/G_DATA_Blog_Ransomware_Vaccine_Preview_b30b80f69c.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/678606500/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/678606500/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/678606500/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/678606500/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/678606500/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
<item>
<feedburner:origLink>https://www.gdatasoftware.com/blog/2021/12/37178-attacks-possibly-imminent-due-to-log4shell-vulnerability</feedburner:origLink>
					<pubDate>Thu, 16 Dec 2021 09:01:00 +0100</pubDate>
					<title><![CDATA[Germanys National Cybersecurity Agency declares red alert: Wave of attacks possibly imminent due to Log4Shell vulnerability]]></title>
					<link>https://feeds.feedblitz.com/~/675268604/0/gdatasecurityblog-en~Germanys-National-Cybersecurity-Agency-declares-red-alert-Wave-of-attacks-possibly-imminent-due-to-LogShell-vulnerability</link>
					<guid>https://www.gdatasoftware.com/blog/2021/12/37178-attacks-possibly-imminent-due-to-log4shell-vulnerability</guid>
					<description><![CDATA[The remaining days before Christmas will not be relaxing ones for IT and IT security managers in companies around the world: The Log4Shell security vulnerability is currently keeping the IT world on tenterhooks.<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/0/1/GDATA_Banner_SecurityAlert_768x350_Logo_f25756e465.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/0/1/GDATA_Banner_SecurityAlert_768x350_Logo_f25756e465.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/675268604/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/675268604/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/675268604/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/675268604/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/675268604/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</description>
                    <enclosure url="https://www.gdatasoftware.com/fileadmin/_processed_/0/1/GDATA_Banner_SecurityAlert_768x350_Logo_f25756e465.jpg" length="0" type="image/jpeg" /><content:encoded><![CDATA[<p>The remaining days before Christmas will not be relaxing ones for IT and IT security managers in companies around the world: The Log4Shell security vulnerability is currently keeping the IT world on tenterhooks.</p><Img align="left" border="0" height="1" width="1" alt="" style="border:0;float:left;margin:0;padding:0;width:1px!important;height:1px!important;" hspace="0" src="https://feeds.feedblitz.com/~/i/675268604/0/gdatasecurityblog-en">
<div class="fbz_enclosure" style="clear:left"><a href="https://www.gdatasoftware.com/fileadmin/_processed_/0/1/GDATA_Banner_SecurityAlert_768x350_Logo_f25756e465.jpg" title="View image"><img border="0" style="max-width:100%" src="https://www.gdatasoftware.com/fileadmin/_processed_/0/1/GDATA_Banner_SecurityAlert_768x350_Logo_f25756e465.jpg"/></a></div>
<div style="clear:both;padding-top:0.2em;"><a title="Add to FaceBook" href="https://feeds.feedblitz.com/_/2/675268604/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fbshare20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Like on Facebook" href="https://feeds.feedblitz.com/_/28/675268604/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/fblike20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Tweet This" href="https://feeds.feedblitz.com/_/24/675268604/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/twitter20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by email" href="https://feeds.feedblitz.com/_/19/675268604/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/email20.png" style="border:0;margin:0;padding:0;"></a>&#160;<a title="Subscribe by RSS" href="https://feeds.feedblitz.com/_/20/675268604/GDataSecurityBlog-EN"><img height="20" src="https://assets.feedblitz.com/i/rss20.png" style="border:0;margin:0;padding:0;"></a>&#160;</div>]]>
</content:encoded></item>
</channel></rss>

