Hacking and testing

Error Culture

Since 2013, we have been promoting collaboration with independent security researchers through the Bug Bounty Program.

Blogs

Your choice

Deutsche Telekom Security Testing Team

Blog.Telekom

The chatbot as exploit

5 weeks

A package lies in front of the entrance door

Blog.Telekom

Moqhao masters new tricks

2 years

Smartphone showing a malware warning

Blog.Telekom

Flubot’s Smishing Campaigns under the Microscope

4 years

Deutsche Telekom Security analysis: This is LOCKDATA Auction

Blog.Telekom

LOCKDATA Auction – Another leak marketplace showing the recent shift of ransomware operators

4 years

Fists of fire and water meet hard

Blog.Telekom

Let’s set ice on fire: Hunting and detecting IcedID...

4 years

Insights into TA505’s ransomware operations.

Blog.Telekom

Inside of CL0P’s ransomware operation

4 years

Smokeloader emerged from the Russian cybercrime underground in 2011 but is still alive.

Blog.Telekom

Smokeloader is still alive and kickin’ – A new...

4 years

The successful model of the German Corona Warning app helps protecting Europe

Blog.Telekom

How Europe is battling Covid-19

5 years

Cybersecurity: TA505’s Box of Chocolate

Blog.Telekom

TA505 returns with a new bag of tricks

5 years

20200511-LOLSnif-EN

Blog.Telekom

LOLSnif – Tracking Another Ursnif-Based Targeted...

5 years

Cybersecurity: TA505’s Box of Chocolate

Blog.Telekom

TA505's Box of Chocolate - On Hidden Gems packed...

5 years

Emotet became world famous in 2019 and is still very active

Blog.Telekom

Dissecting Emotet - Part 2

5 years

Thomas Barabosch

Blog.Telekom

Dissecting Emotet – Part 1

5 years

FAQShare