KW 13: Security leak at CureVac, Hackers attack WHO, Ukraine as a Mecca for IT security


More women in cybersecurity: Women are entering and rising through the ranks of cybersecurity experts, with more expected to join these ranks in coming years, according to the results of the Women in Cybersecurity Survey by SANS Institute. By the end of 2019, women represented 20% of the global cybersecurity workforce, up dramatically from 2013, when only 11% of the workforce was female. 41% of respondents credited being in the right place at the right time for their rise into senior or leadership positions. Others credited having varied experiences (38%) or pursuing certifications (34%) with their rise into a senior or leadership positions.,

Security leak at CureVac: The biotech company CureVac apparently has IT security holes. The German company became well-known in the past few weeks following reports that US President Donald Trump offered the firm large sums of money for exclusive rights to a coronavirus vaccine, which CureVac is currently working on. It has now become known that past data leaks also included passwords from CureVac email addresses. While these have probably already been changed, a security expert still warned of the company’s unsafe server structure: “Everything on one server is a wild zoo of unnecessarily public services, including two databases. It doesn’t look like great care is being exercised here.”,

Corona and cybercrime: Cybercriminals are adapting to the new circumstances of the coronavirus crisis. People should watch out for any links texted to their Android phone promising an app to track the virus. Downloading the application will let snoops watch users through their smartphone camera, listen to them through their microphone or pilfer all their text messages. Meanwhile, an authentic looking email from the World Health Organization WHO isn’t real at all, but rather clever spam meant to steal personal information. And then there’s the Centers for Disease Control and Prevention in the US asking for donations, except it’s not the CDC, but a fake website. Corporate security and consumer officials say these recent examples to exploit the pandemic are just the beginning of a tsunami of fraud.,

Hackers attack WHO: Hackers tried to break into the World Health Organization earlier this month, part of what a senior agency official said was a more than two-fold increase in cyberattacks. WHO Chief Information Security Officer Flavio Aggio said the identity of the hackers was unclear and the effort was unsuccessful. But he warned that hacking attempts against the agency and its partners have soared as they battle to contain the coronavirus. Two sources told “Reuters” that they suspected an advanced group of hackers known as DarkHotel, which has been conducting cyber-espionage operations since at least 2007.

Windows 10 vulnerable to cyberattacks: Microsoft has warned of cyberattacks actively exploiting two vulnerabilities found in the Windows Adobe Type Manager Library, which allows apps to manage and render fonts available from Adobe Systems. According to a security advisory, the vulnerabilities are being used in limited targeted attacks, and all supported Windows operating systems could be at risk. Attackers may exploit the vulnerabilities by getting their targets to open booby-trapped documents or view them in the Windows preview pane. Microsoft is still working to fix the vulnerabilities.

Update: Emergency patch for Adobe Creative Cloud Application
University information system: Sensitive university data online for 9 years
Data leak: Security company accidentally puts huge leak database online
IT security: Eight security rules for the home office
Hidden Cobra: How North Korea hacks are being detected


42,000 people took part in Germany’s “Hackathon” to find solutions to the coronavirus pandemic. The competition was supported by the federal government.


Germans don’t trust the cloud: On behalf of the web hosting provider Strato, opinion research institute Forsa asked people in Germany and the Netherlands about the topics of cloud use and cybersecurity. Only about half of all German participants feel safe on the internet, while over three quarters of those surveyed in the Netherlands have no concerns. Germans are also more cautious when it comes to storing passwords or other sensitive data such as financial information in the cloud. 80 percent of German participants don’t use the cloud at all. Only about 20 to 30 percent of German respondents store information online, while almost half of the Dutch store data in the cloud. The main reasons for not storing data in the cloud are security concerns.

Ukraine as a Mecca for IT security: Since the year 2014, the Ukraine has been developing into a kind of test site for cyberattacks and IT security. The local hacking scene has become more professional and even the United States is sending experts to the country to learn about how to respond to cyberattacks. Russian organizations are believed to be behind a large portion of cyberattacks. For example, the “Notpetya” virus wreaked havoc on Ukrainian computers, but also at international companies such as Fedex, Merck and Maersk. Power grids and electricity suppliers were also increasingly targeted. The Ukrainian IT security industry has grown significantly and is increasingly working together with the Ukrainian government due to the constant threat of cyberattacks.


“With about two unique attacks per second, the sheer number of attacks makes it impossible to make decisions without the appropriate automatisms.”
Richard Werner, Business Consultant at Trend Micro, on the use of AI in IT security.


DDoS attack on German food delivery company Lieferando: The measures adopted by Germany to limit the spread of the coronavirus have a drastic impact on social life. Restaurants function under strict rules that limit business hours, the number of guests and impose a greater distance between tables. Under these conditions, many Germans order in through food delivery services like ( But cybercriminals have launched a distributed denial-of-service attack on the website demanding 2 bitcoins (around $11,000) to stop the siege. Jitse Groen, the founder and CEO of Takeaway, said the company paid no money and survived the attack.

Newsletter subscription

Subscribe to our free weekly newsletter for a compact overview of safety and security topics:


More digital news briefings

Our political briefings