This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

it-sa 365 Teaser
IT Security Talks Technology I

Meow Attack

Why IT security is so complex that cats become a problem

calendar_today Wed, 16.06.2021, 13:15 - 13:30

event_available Digital

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Data security / DLP / Know-how protection

Event

This action is part of the event IT Security Talks

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

With cats you conquer the internet - this wisdom has been known for a long time, but now it has been reinterpreted. Due to misconfigurations it was possible for unknown persons to delete the content of hundreds of databases. This could have easily been prevented! The Meow Attack has shown us again how big problems can be caused by small inattentions. Although strictly speaking the Meow Attack is more of an exploit than an attack, the results were clear. Due to misconfiguration it was possible to delete the content of hundreds of databases within a short time and replace them with a string combination of random characters and "meow". This is not the first time something like this happened and it was certainly not the last time - as was proven shortly after with a similar attack, which was called "university_cybersec_experiment. left behind. How easy it is to protect yourself against these kinds of attacks is the topic of this lecture. ... read more

Language: German

Questions and Answers: Yes

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.