{"id":25921,"date":"2023-01-11T10:40:51","date_gmt":"2023-01-11T09:40:51","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/uncategorized\/credential-stuffing-and-password-spraying\/"},"modified":"2025-07-23T10:48:13","modified_gmt":"2025-07-23T08:48:13","slug":"credential-stuffing-and-password-spraying","status":"publish","type":"post","link":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/","title":{"rendered":"Credential stuffing and password spraying"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-10w0ne-83275210999af2721c3b7a850c3db44d entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkwvcm-b29a06cc5e4f0b9ee2456e7f226ada7d\">\n.flex_cell.av-jumkwvcm-b29a06cc5e4f0b9ee2456e7f226ada7d{\nvertical-align:middle;\nheight:200px;\nmin-height:200px;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkwvcm-b29a06cc5e4f0b9ee2456e7f226ada7d{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkwvcm-b29a06cc5e4f0b9ee2456e7f226ada7d av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkxgop-1cfc753a53e5d0d35f1c1af0d3380d44\">\n.flex_cell.av-jumkxgop-1cfc753a53e5d0d35f1c1af0d3380d44{\nvertical-align:top;\nheight:200px;\nmin-height:200px;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkxgop-1cfc753a53e5d0d35f1c1af0d3380d44{\npadding:60px 30px 60px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkxgop-1cfc753a53e5d0d35f1c1af0d3380d44 av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kl9zwv8x-54c3ac169a4c6164709829a8bf6d1a0b\">\n#top .av-special-heading.av-kl9zwv8x-54c3ac169a4c6164709829a8bf6d1a0b{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-kl9zwv8x-54c3ac169a4c6164709829a8bf6d1a0b .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-kl9zwv8x-54c3ac169a4c6164709829a8bf6d1a0b .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-kl9zwv8x-54c3ac169a4c6164709829a8bf6d1a0b .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-kl9zwv8x-54c3ac169a4c6164709829a8bf6d1a0b .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-kl9zwv8x-54c3ac169a4c6164709829a8bf6d1a0b .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-kl9zwv8x-54c3ac169a4c6164709829a8bf6d1a0b .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-kl9zwv8x-54c3ac169a4c6164709829a8bf6d1a0b av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-3  el_before_av_textblock  avia-builder-el-first  av-inherit-size av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Credential stuffing and password spraying: Security tips for service provider and users<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jy8jdxp7-9cb3daed7ee04a6bde8ee05c4fa7a0d2\">\n#top .av_textblock_section.av-jy8jdxp7-9cb3daed7ee04a6bde8ee05c4fa7a0d2 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-jy8jdxp7-9cb3daed7ee04a6bde8ee05c4fa7a0d2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" >11. January, 2023\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-2'  class='av-layout-grid-container av-10w0ne-4-f903112fccbe8d02b1396e7a3e98fa28 entry-content-wrapper main_color av-fixed-cells  avia-builder-el-5  el_after_av_layout_row  el_before_av_textblock  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkwvcm-3-b266ceb12c9659e9a2c2f27338ebc70f\">\n.flex_cell.av-jumkwvcm-3-b266ceb12c9659e9a2c2f27338ebc70f{\nvertical-align:top;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkwvcm-3-b266ceb12c9659e9a2c2f27338ebc70f{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkwvcm-3-b266ceb12c9659e9a2c2f27338ebc70f av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-6  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkxgop-2-c2b9dfd49a7eea46ea3af0af91ff33db\">\n.flex_cell.av-jumkxgop-2-c2b9dfd49a7eea46ea3af0af91ff33db{\nvertical-align:top;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkxgop-2-c2b9dfd49a7eea46ea3af0af91ff33db{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkxgop-2-c2b9dfd49a7eea46ea3af0af91ff33db av-gridrow-cell av_one_half no_margin  avia-builder-el-7  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<\/div><div id='after_grid_row_2'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-25921'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-jy8jdxp7-1-1d99c7a78c629eafdf69e5549ef42aaa '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Credential stuffing is a fairly simple form of cyber-attack in which captured user information from one service is used to gain access to other services. Unlike brute force attacks, attackers use existing, stolen user information instead of guessing passwords (automatically). Testing a weak password (\u201cpassword\u201d, \u201e123456\u201c, \u201eqwerty\u201c) without a specific goal against multiple different usernames is called password spraying.<\/p>\n<h3>Aims and motives behind credential stuffing and password spraying<\/h3>\n<p>Cyber criminals can use highly automated tools to try out vast amounts of usernames and passwords on many different websites and applications without much effort. The login data that is used comes, for example, from databases acquired on the darknet or from collections from data leaks, phishing or other security incidents. Even if the percentage-hit rate is low, it is worthwhile: databases with up to several hundred million entries are available.<\/p>\n<p>Credential stuffing is only successful if the same credentials are active on several different services. For password spraying attacks, it is enough to use a password that has already appeared on any leak list.<\/p>\n<p>The aim of these attacks is to gain access to various services. Attackers misuse bank accounts for financial gain or identity theft and email-access for further attacks or account takeovers. Shopping in online shops under false names and invoices is also popular. In addition to the hassle, time and financial losses, this can lead to reputational damage for individuals or companies.<\/p>\n<h3>How to prevent credential stuffing and password spraying?<\/h3>\n<p>To carry out credential-stuffing and password-spraying attacks, attackers use tools and scripts that can automatically perform hundreds or thousands of login attempts per minute. To make detection more difficult, the access attempts are increasingly disguised as legitimate requests. However, various security measures can increase security\u2013\u2013ideally in combination.<\/p>\n<h4>Security tips for online services:<\/h4>\n<ul>\n<li>Offering <strong>two- or multi-factor authentication<\/strong> is one of the simplest and most efficient possibilities to prevent credential stuffing and password spraying. If permanent use is not possible, limit usage to certain scenarios such as logging in from a new or unusual location, a new device or browser, or in the case of suspicious login behaviour. (Less secure) alternatives may be additional PINs or security questions.<\/li>\n<li><strong>Rate limiting<\/strong> aims to prevent credential stuffing and password spraying by delaying or limiting the number of login attempts. However, modern attack techniques adapt to these tactics by, for example, reducing the number and speed of attempts or simulating different IP addresses and devices. Dynamic rate limits based on actual user behaviour can remedy this.<\/li>\n<li><strong>Require secure passwords<\/strong>: Some systems have password protection functions that prevent registration with passwords that are too simple or allow blacklisting passwords that are too common. Using the <a href=\"https:\/\/haveibeenpwned.com\/Passwords\">Pwned Passwords list<\/a>, operators of online services can check passwords against hundreds of millions of stolen passwords when logging in or renewing them, and ask their users to use a different password if necessary.<\/li>\n<li><strong>Alternative user names<\/strong> instead of the email address can impede credential stuffing since it is based on finding accounts with the same combination of usernames and passwords.<\/li>\n<li><strong>IP-Blocking<\/strong>: Block known malicious IP addresses as well as IP addresses with a defined number of unsuccessful login attempts via block list.<\/li>\n<li><strong>Captchas<\/strong> aim to identify people and can make automated login attempts more difficult or reduce their speed or profitability.<\/li>\n<li><strong>User notifications<\/strong>: Warn users in case of suspicious login failures, for example if the password was correct but not the second authentication factor. Also, show the date, time and location of the last successful login.<\/li>\n<li>A multi-step login process, where e.g. username and password have to be entered in two separate steps, makes attack attempts at least somewhat more laborious.<\/li>\n<\/ul>\n<h4>Security tips for users:<\/h4>\n<ul>\n<li>Without exception, use <strong>different passwords<\/strong> for different websites. Attackers already know the trick of using different numbers!<\/li>\n<li>In case of <strong>old accounts<\/strong>: Log in to each account and change the password as soon as possible. Make sure you use a different password for each account.<\/li>\n<li>Use <strong>alternative e-mail addresses<\/strong> instead of your main address for less important or rarely used portals.<\/li>\n<li>Unless absolutely necessary, do not give your email address or use e.g. <strong>throw-away email addresses<\/strong> like <a href=\"https:\/\/10minutemail.net\/\">net<\/a><\/li>\n<li>A <strong>password manager<\/strong> that also generates and manages random phrases can help to manage the different data.<\/li>\n<li>If offered by the service, be sure to use <strong>2-factor authentication<\/strong>.<\/li>\n<li>Never <strong>share access data<\/strong> via insecure communication channels.<\/li>\n<\/ul>\n<p>As a matter of principle, do not pass on your access data without thinking. Be particularly careful when clicking on links in emails or messages, especially if they ask you to enter your login details. Always go directly to the desired website instead of following a link. Only confirm 2-factor requests if you are about to log in and have initiated the request yourself.<\/p>\n<h3>Identify stolen password and change them immediately<\/h3>\n<p>There are various ways for users to be informed or automatically notified if their own data turn up in dubious collections after a security incident. Here are three examples:<\/p>\n<ul>\n<li>The Google Password Manager in Chrome warns you when stolen login combinations are leaked on the internet<\/li>\n<li>Firefox Monitor allows for monitoring your email-address and notifies you in case of incidents<\/li>\n<li>A manual check of one&#8217;s own e-mail address is possible, for example, at <a href=\"https:\/\/haveibeenpwned.com\/\">com<\/a>.<\/li>\n<\/ul>\n<p>In addition, we recommend deleting or deactivating accounts that you do no longer need or use.<\/p>\n<p><strong>Conclusion:<\/strong> Both users and service operators can help prevent credential stuffing and password spraying attacks or at least make them more difficult. The more measures are implemented, the more costly and consequently less profitable the attack attempts will be.<\/p>\n<p>Strong, unique passwords and the use of two- or multi-factor authentication remain essential for account security. Also, be careful when using public computers and WLAN networks, as third parties could read your data entries there. Watch out for possible phishing attacks and do not give out personal or financial information to unknown third parties.<\/p>\n<h3><\/h3>\n<p><strong>This might also interest you:<\/strong><\/p>\n<p><a href=\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/secure-apis-against-unauthorised-access-and-manipulation\/\">Secure APIs against unauthorised access and manipulation<\/a><br \/>\n<a href=\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/current-cyber-attacks-screened-how-attackers-get-into-your-system\/\">Current cyber-attacks screened: How attackers get into your system<\/a><br \/>\n<a href=\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-tricks-on-phishing-websites\/\">New tricks on phishing websites<\/a><\/p>\n<p><small>Sources:<\/small><br \/>\n<small><a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/haveibeenpwned.com\/<\/a><br \/>\n<\/small><small><a href=\"https:\/\/monitor.firefox.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/monitor.firefox.com\/<\/a><\/small><br \/>\n<small><a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Credential_Stuffing_Prevention_Cheat_Sheet.html\" target=\"_blank\" rel=\"noopener\">https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Credential_Stuffing_Prevention_Cheat_Sheet.html<\/a><\/small><\/p>\n<\/div><\/section>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-klkqz9z1-d0456ab5832fa5d0be2edd96410f9df4\">\n#top .hr.hr-invisible.av-klkqz9z1-d0456ab5832fa5d0be2edd96410f9df4{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-klkqz9z1-d0456ab5832fa5d0be2edd96410f9df4 hr-invisible  avia-builder-el-9  el_after_av_textblock  el_before_av_button '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<div  class='avia-button-wrap av-klkqvzoc-527b3e654c3fafcb2d5263ff7ebc91ee-wrap avia-button-left  avia-builder-el-10  el_after_av_hr  el_before_av_postslider '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-klkqvzoc-527b3e654c3fafcb2d5263ff7ebc91ee\">\n#top #wrap_all .avia-button.av-klkqvzoc-527b3e654c3fafcb2d5263ff7ebc91ee{\nbackground-color:#0993ba;\nborder-color:#0993ba;\ncolor:#ffffff;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-klkqvzoc-527b3e654c3fafcb2d5263ff7ebc91ee .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<a href='https:\/\/www.ikarussecurity.com\/en\/security-news\/newsletter\/'  class='avia-button av-klkqvzoc-527b3e654c3fafcb2d5263ff7ebc91ee av-link-btn avia-icon_select-no avia-size-small avia-position-left'   aria-label=\"Security tips conveniently in your inbox: Subscribe to IKARUS News now\"><span class='avia_iconbox_title' >Security tips conveniently in your inbox: Subscribe to IKARUS News now<\/span><\/a><\/div>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:&quot;5&quot;,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-slider-active avia-content-slider1 avia-content-slider-even  avia-builder-el-11  el_after_av_button  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-45145 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_fourth first fake-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/press-releases\/g-data-cyberdefense-ikarus-security-and-securepoint-enter-into-a-strategic-partnership\/' data-rel='slide-1' class='slide-image' title='G DATA CyberDefense, IKARUS Security and Securepoint enter into a strategic partnership'><span class='fallback-post-type-icon avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='pencil' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"25\" height=\"32\" viewBox=\"0 0 25 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M22.976 5.44q1.024 1.024 1.504 2.048t0.48 1.536v0.512l-8.064 8.064-9.28 9.216-7.616 1.664 1.6-7.68 9.28-9.216 8.064-8.064q1.728-0.384 4.032 1.92zM7.168 25.92l0.768-0.768q-0.064-1.408-1.664-3.008-0.704-0.704-1.44-1.12t-1.12-0.416l-0.448-0.064-0.704 0.768-0.576 2.56q0.896 0.512 1.472 1.088 0.768 0.768 1.152 1.536z\"><\/path>\n<\/svg><\/span><span class='slider-fallback-image'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"201\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-300x201.jpg\" class=\"wp-image-43494 avia-img-lazy-loading-not-43494 attachment-medium size-medium wp-post-image\" alt=\"Full Stack Engineer\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-300x201.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/span><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: G DATA CyberDefense, IKARUS Security and Securepoint enter into a strategic partnership\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/press-releases\/g-data-cyberdefense-ikarus-security-and-securepoint-enter-into-a-strategic-partnership\/' title='G DATA CyberDefense, IKARUS Security and Securepoint enter into a strategic partnership'>G DATA CyberDefense, IKARUS Security and Securepoint enter into a strategic partnership<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-04-22T09:24:26+02:00\" >22. April 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>0<\/span>\n\t\t\t\t\t\t<span itemprop='width'>0<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-01-11T10:40:51+01:00\" >2026-04-22 09:24:26<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-04-23 09:26:07<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>G DATA CyberDefense, IKARUS Security and Securepoint enter into a strategic partnership<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44936 slide-entry-overview slide-loop-2 slide-parity-even  av_one_fourth  fake-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/release-notes-and-product-updates\/virus-filter-settings-for-inbound-and-outbound-routes-have-been-unified\/' data-rel='slide-1' class='slide-image' title='Virus filter settings for inbound and outbound routes have been unified'><span class='fallback-post-type-icon avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='pencil' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"25\" height=\"32\" viewBox=\"0 0 25 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M22.976 5.44q1.024 1.024 1.504 2.048t0.48 1.536v0.512l-8.064 8.064-9.28 9.216-7.616 1.664 1.6-7.68 9.28-9.216 8.064-8.064q1.728-0.384 4.032 1.92zM7.168 25.92l0.768-0.768q-0.064-1.408-1.664-3.008-0.704-0.704-1.44-1.12t-1.12-0.416l-0.448-0.064-0.704 0.768-0.576 2.56q0.896 0.512 1.472 1.088 0.768 0.768 1.152 1.536z\"><\/path>\n<\/svg><\/span><span class='slider-fallback-image'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"201\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-300x201.jpg\" class=\"wp-image-43494 avia-img-lazy-loading-not-43494 attachment-medium size-medium wp-post-image\" alt=\"Full Stack Engineer\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-300x201.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/span><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Virus filter settings for inbound and outbound routes have been unified\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/release-notes-and-product-updates\/virus-filter-settings-for-inbound-and-outbound-routes-have-been-unified\/' title='Virus filter settings for inbound and outbound routes have been unified'>Virus filter settings for inbound and outbound routes have been unified<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-31T10:24:47+02:00\" >31. March 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>0<\/span>\n\t\t\t\t\t\t<span itemprop='width'>0<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-01-11T10:40:51+01:00\" >2026-03-31 10:24:47<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-04-09 10:25:56<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Virus filter settings for inbound and outbound routes have been unified<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44856 slide-entry-overview slide-loop-3 slide-parity-odd  av_one_fourth  fake-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/release-notes-and-product-updates\/optimized-mailbox-management\/' data-rel='slide-1' class='slide-image' title='Optimized Mailbox Management'><span class='fallback-post-type-icon avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='pencil' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"25\" height=\"32\" viewBox=\"0 0 25 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M22.976 5.44q1.024 1.024 1.504 2.048t0.48 1.536v0.512l-8.064 8.064-9.28 9.216-7.616 1.664 1.6-7.68 9.28-9.216 8.064-8.064q1.728-0.384 4.032 1.92zM7.168 25.92l0.768-0.768q-0.064-1.408-1.664-3.008-0.704-0.704-1.44-1.12t-1.12-0.416l-0.448-0.064-0.704 0.768-0.576 2.56q0.896 0.512 1.472 1.088 0.768 0.768 1.152 1.536z\"><\/path>\n<\/svg><\/span><span class='slider-fallback-image'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"201\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-300x201.jpg\" class=\"wp-image-43494 avia-img-lazy-loading-not-43494 attachment-medium size-medium wp-post-image\" alt=\"Full Stack Engineer\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-300x201.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/span><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Optimized Mailbox Management\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/release-notes-and-product-updates\/optimized-mailbox-management\/' title='Optimized Mailbox Management'>Optimized Mailbox Management<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-11T12:54:50+01:00\" >11. March 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>0<\/span>\n\t\t\t\t\t\t<span itemprop='width'>0<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-01-11T10:40:51+01:00\" >2026-03-11 12:54:50<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-04-09 10:28:20<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Optimized Mailbox Management<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44708 slide-entry-overview slide-loop-4 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/cyber-threats-in-europe\/' data-rel='slide-1' class='slide-image' title='Cyber Threats in Europe'><img decoding=\"async\" fetchpriority=\"high\" width=\"212\" height=\"300\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/ENISA-Threat-Landscape-Report-2025--212x300.png\" class=\"wp-image-44704 avia-img-lazy-loading-not-44704 attachment-medium size-medium wp-post-image\" alt=\"ENISA Threat Landscape Report 2025\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/ENISA-Threat-Landscape-Report-2025--212x300.png 212w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/ENISA-Threat-Landscape-Report-2025-.png 300w\" sizes=\"(max-width: 212px) 100vw, 212px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Cyber Threats in Europe\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/cyber-threats-in-europe\/' title='Cyber Threats in Europe'>Cyber Threats in Europe<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-10T10:49:24+01:00\" >10. March 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/ENISA-Threat-Landscape-Report-2025-.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>424<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-01-11T10:40:51+01:00\" >2026-03-10 10:49:24<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-10 11:06:01<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Cyber Threats in Europe<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-44622 slide-entry-overview slide-loop-5 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-company-name-and-new-office-address-as-of-march-1-2026\/' data-rel='slide-1' class='slide-image' title='New Company Name and New Office Address as of March 1, 2026'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"72\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350-300x72.png\" class=\"wp-image-44613 avia-img-lazy-loading-not-44613 attachment-medium size-medium wp-post-image\" alt=\"IKARUS Security\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350-300x72.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350.png 350w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: New Company Name and New Office Address as of March 1, 2026\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-company-name-and-new-office-address-as-of-march-1-2026\/' title='New Company Name and New Office Address as of March 1, 2026'>New Company Name and New Office Address as of March 1, 2026<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-02T10:06:20+01:00\" >2. March 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>84<\/span>\n\t\t\t\t\t\t<span itemprop='width'>350<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-01-11T10:40:51+01:00\" >2026-03-02 10:06:20<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-02 10:06:29<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>New Company Name and New Office Address as of March 1, 2026<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44447 slide-entry-overview slide-loop-6 slide-parity-even  av_one_fourth  fake-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/release-notes-and-product-updates\/new-features-o365-sync-smtp-logs\/' data-rel='slide-1' class='slide-image' title='New Features: O365 Sync &#038; SMTP Logs'><span class='fallback-post-type-icon avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='pencil' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"25\" height=\"32\" viewBox=\"0 0 25 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M22.976 5.44q1.024 1.024 1.504 2.048t0.48 1.536v0.512l-8.064 8.064-9.28 9.216-7.616 1.664 1.6-7.68 9.28-9.216 8.064-8.064q1.728-0.384 4.032 1.92zM7.168 25.92l0.768-0.768q-0.064-1.408-1.664-3.008-0.704-0.704-1.44-1.12t-1.12-0.416l-0.448-0.064-0.704 0.768-0.576 2.56q0.896 0.512 1.472 1.088 0.768 0.768 1.152 1.536z\"><\/path>\n<\/svg><\/span><span class='slider-fallback-image'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"201\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-300x201.jpg\" class=\"wp-image-43494 avia-img-lazy-loading-not-43494 attachment-medium size-medium wp-post-image\" alt=\"Full Stack Engineer\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-300x201.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/span><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: New Features: O365 Sync &amp; SMTP Logs\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/release-notes-and-product-updates\/new-features-o365-sync-smtp-logs\/' title='New Features: O365 Sync &#038; SMTP Logs'>New Features: O365 Sync &#038; SMTP Logs<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-02-12T09:29:06+01:00\" >12. February 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>0<\/span>\n\t\t\t\t\t\t<span itemprop='width'>0<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-01-11T10:40:51+01:00\" >2026-02-12 09:29:06<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-02-12 09:29:08<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>New Features: O365 Sync &#038; SMTP Logs<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44362 slide-entry-overview slide-loop-7 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/bsi-certified-edr-agent-for-harfanglab-guard-feat-ikarus\/' data-rel='slide-1' class='slide-image' title='BSI-certified EDR agent for HarfangLab Guard feat. IKARUS'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"300\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019-300x300.png\" class=\"wp-image-44368 avia-img-lazy-loading-not-44368 attachment-medium size-medium wp-post-image\" alt=\"BSI-Certification\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019-300x300.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019-80x80.png 80w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019-36x36.png 36w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019-180x180.png 180w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019-705x705.png 705w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019.png 752w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: BSI-certified EDR agent for HarfangLab Guard feat. IKARUS\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/bsi-certified-edr-agent-for-harfanglab-guard-feat-ikarus\/' title='BSI-certified EDR agent for HarfangLab Guard feat. IKARUS'>BSI-certified EDR agent for HarfangLab Guard feat. IKARUS<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-02-02T16:12:31+01:00\" >2. February 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>753<\/span>\n\t\t\t\t\t\t<span itemprop='width'>752<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-01-11T10:40:51+01:00\" >2026-02-02 16:12:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-02-02 16:18:51<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>BSI-certified EDR agent for HarfangLab Guard feat. IKARUS<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44284 slide-entry-overview slide-loop-8 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/austrian-universities-move-toward-european-endpoint-security-with-data-sovereignty\/' data-rel='slide-1' class='slide-image' title='Austrian Universities Move Toward European Endpoint Security with Data Sovereignty'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"214\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-300x214.jpg\" class=\"wp-image-35536 avia-img-lazy-loading-not-35536 attachment-medium size-medium wp-post-image\" alt=\"HarfangLab Guard\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-300x214.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-260x185.jpg 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Austrian Universities Move Toward European Endpoint Security with Data Sovereignty\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/austrian-universities-move-toward-european-endpoint-security-with-data-sovereignty\/' title='Austrian Universities Move Toward European Endpoint Security with Data Sovereignty'>Austrian Universities Move Toward European Endpoint Security with Data Sovereignty<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-01-27T11:45:07+01:00\" >27. January 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>285<\/span>\n\t\t\t\t\t\t<span itemprop='width'>400<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-01-11T10:40:51+01:00\" >2026-01-27 11:45:07<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-01-27 11:47:47<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Austrian Universities Move Toward European Endpoint Security with Data Sovereignty<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-44261 slide-entry-overview slide-loop-9 slide-parity-odd  av_one_fourth first fake-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/release-notes-and-product-updates\/ikarus-mobile-management-server-version-6-19-xx-release-bulletin\/' data-rel='slide-1' class='slide-image' title='IKARUS mobile.management \u2013 Server \u2013 Version 6.19.xx \u2013 Release Bulletin'><span class='fallback-post-type-icon avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='pencil' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"25\" height=\"32\" viewBox=\"0 0 25 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M22.976 5.44q1.024 1.024 1.504 2.048t0.48 1.536v0.512l-8.064 8.064-9.28 9.216-7.616 1.664 1.6-7.68 9.28-9.216 8.064-8.064q1.728-0.384 4.032 1.92zM7.168 25.92l0.768-0.768q-0.064-1.408-1.664-3.008-0.704-0.704-1.44-1.12t-1.12-0.416l-0.448-0.064-0.704 0.768-0.576 2.56q0.896 0.512 1.472 1.088 0.768 0.768 1.152 1.536z\"><\/path>\n<\/svg><\/span><span class='slider-fallback-image'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"201\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-300x201.jpg\" class=\"wp-image-43494 avia-img-lazy-loading-not-43494 attachment-medium size-medium wp-post-image\" alt=\"Full Stack Engineer\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-300x201.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/span><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: IKARUS mobile.management \u2013 Server \u2013 Version 6.19.xx \u2013 Release Bulletin\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/release-notes-and-product-updates\/ikarus-mobile-management-server-version-6-19-xx-release-bulletin\/' title='IKARUS mobile.management \u2013 Server \u2013 Version 6.19.xx \u2013 Release Bulletin'>IKARUS mobile.management \u2013 Server \u2013 Version 6.19.xx \u2013 Release Bulletin<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-01-14T11:51:50+01:00\" >14. January 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>0<\/span>\n\t\t\t\t\t\t<span itemprop='width'>0<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-01-11T10:40:51+01:00\" >2026-01-14 11:51:50<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-01-14 11:51:50<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>IKARUS mobile.management \u2013 Server \u2013 Version 6.19.xx \u2013 Release Bulletin<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44253 slide-entry-overview slide-loop-10 slide-parity-even  av_one_fourth  fake-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/release-notes-and-product-updates\/ikarus-mobile-management-server-version-6-19-xx\/' data-rel='slide-1' class='slide-image' title='IKARUS mobile.management \u2013 Server \u2013 Version 6.19.xx'><span class='fallback-post-type-icon avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='pencil' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"25\" height=\"32\" viewBox=\"0 0 25 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M22.976 5.44q1.024 1.024 1.504 2.048t0.48 1.536v0.512l-8.064 8.064-9.28 9.216-7.616 1.664 1.6-7.68 9.28-9.216 8.064-8.064q1.728-0.384 4.032 1.92zM7.168 25.92l0.768-0.768q-0.064-1.408-1.664-3.008-0.704-0.704-1.44-1.12t-1.12-0.416l-0.448-0.064-0.704 0.768-0.576 2.56q0.896 0.512 1.472 1.088 0.768 0.768 1.152 1.536z\"><\/path>\n<\/svg><\/span><span class='slider-fallback-image'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"201\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-300x201.jpg\" class=\"wp-image-43494 avia-img-lazy-loading-not-43494 attachment-medium size-medium wp-post-image\" alt=\"Full Stack Engineer\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-300x201.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/span><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: IKARUS mobile.management \u2013 Server \u2013 Version 6.19.xx\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/release-notes-and-product-updates\/ikarus-mobile-management-server-version-6-19-xx\/' title='IKARUS mobile.management \u2013 Server \u2013 Version 6.19.xx'>IKARUS mobile.management \u2013 Server \u2013 Version 6.19.xx<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-01-14T11:42:31+01:00\" >14. January 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>0<\/span>\n\t\t\t\t\t\t<span itemprop='width'>0<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-01-11T10:40:51+01:00\" >2026-01-14 11:42:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-01-14 11:42:31<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>IKARUS mobile.management \u2013 Server \u2013 Version 6.19.xx<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44159 slide-entry-overview slide-loop-11 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/attack-surface-management-asm\/' data-rel='slide-1' class='slide-image' title='Attack Surface Management (ASM)'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"234\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600-300x234.jpg\" class=\"wp-image-44156 avia-img-lazy-loading-not-44156 attachment-medium size-medium wp-post-image\" alt=\"Attack Surface Management (ASM)\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600-300x234.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Attack Surface Management (ASM)\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/attack-surface-management-asm\/' title='Attack Surface Management (ASM)'>Attack Surface Management (ASM)<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-12-09T11:49:31+01:00\" >9. December 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>467<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-01-11T10:40:51+01:00\" >2025-12-09 11:49:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-12-09 11:49:32<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Attack Surface Management (ASM)<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44134 slide-entry-overview slide-loop-12 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/digital-sovereignty-in-practice-ikarus-and-harfanglab-as-a-success-story-for-european-cybersecurity\/' data-rel='slide-1' class='slide-image' title='Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"200\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-300x200.jpg\" class=\"wp-image-44018 avia-img-lazy-loading-not-44018 attachment-medium size-medium wp-post-image\" alt=\"IKARUS CEO Joe Pichlmayr and Gr\u00e9goire Germain\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-300x200.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-1030x687.jpg 1030w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-768x512.jpg 768w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-1536x1025.jpg 1536w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-1500x1001.jpg 1500w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-705x470.jpg 705w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/digital-sovereignty-in-practice-ikarus-and-harfanglab-as-a-success-story-for-european-cybersecurity\/' title='Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity'>Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-12-03T11:57:52+01:00\" >3. December 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1281<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1920<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-01-11T10:40:51+01:00\" >2025-12-03 11:57:52<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-12-03 11:57:53<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-43945 slide-entry-overview slide-loop-13 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ikarus-named-emea-mssp-of-the-year-2025-by-nozomi-networks\/' data-rel='slide-1' class='slide-image' title='IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"212\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-300x212.png\" class=\"wp-image-43850 avia-img-lazy-loading-not-43850 attachment-medium size-medium wp-post-image\" alt=\"NOZOMI EMEA MSSP Award 2025\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-300x212.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web.png 595w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ikarus-named-emea-mssp-of-the-year-2025-by-nozomi-networks\/' title='IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks'>IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-11-24T12:36:31+01:00\" >24. November 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>420<\/span>\n\t\t\t\t\t\t<span itemprop='width'>595<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-01-11T10:40:51+01:00\" >2025-11-24 12:36:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-11-24 12:36:31<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-43752 slide-entry-overview slide-loop-14 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ascon-new-nist-standard-for-lightweight-iot-cryptography\/' data-rel='slide-1' class='slide-image' title='ASCON: New NIST Standard for Lightweight IoT Cryptography'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"130\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/iot-general-300x130.jpg\" class=\"wp-image-43747 avia-img-lazy-loading-not-43747 attachment-medium size-medium wp-post-image\" alt=\"ASCON: Neuer NIST-Standard f\u00fcr leichtgewichtige IoT-Kryptografie\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/iot-general-300x130.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/iot-general.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: ASCON: New NIST Standard for Lightweight IoT Cryptography\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ascon-new-nist-standard-for-lightweight-iot-cryptography\/' title='ASCON: New NIST Standard for Lightweight IoT Cryptography'>ASCON: New NIST Standard for Lightweight IoT Cryptography<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-11-07T11:46:41+01:00\" >7. November 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/iot-general.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>260<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-01-11T10:40:51+01:00\" >2025-11-07 11:46:41<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-11-07 11:46:53<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>ASCON: New NIST Standard for Lightweight IoT Cryptography<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-43726 slide-entry-overview slide-loop-15 slide-parity-odd  av_one_fourth  fake-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/release-notes-and-product-updates\/ikarus-anti-virus-changes-in-support-for-windows-10-windows-server-2016-from-2026\/' data-rel='slide-1' class='slide-image' title='IKARUS anti.virus: Changes in Support for Windows 10 \/ Windows Server 2016 from 2026'><span class='fallback-post-type-icon avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='pencil' data-av_iconset='svg_entypo-fontello'><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"25\" height=\"32\" viewBox=\"0 0 25 32\" preserveAspectRatio=\"xMidYMid meet\" role=\"graphics-symbol\" aria-hidden=\"true\">\n<path d=\"M22.976 5.44q1.024 1.024 1.504 2.048t0.48 1.536v0.512l-8.064 8.064-9.28 9.216-7.616 1.664 1.6-7.68 9.28-9.216 8.064-8.064q1.728-0.384 4.032 1.92zM7.168 25.92l0.768-0.768q-0.064-1.408-1.664-3.008-0.704-0.704-1.44-1.12t-1.12-0.416l-0.448-0.064-0.704 0.768-0.576 2.56q0.896 0.512 1.472 1.088 0.768 0.768 1.152 1.536z\"><\/path>\n<\/svg><\/span><span class='slider-fallback-image'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"201\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-300x201.jpg\" class=\"wp-image-43494 avia-img-lazy-loading-not-43494 attachment-medium size-medium wp-post-image\" alt=\"Full Stack Engineer\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-300x201.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/span><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: IKARUS anti.virus: Changes in Support for Windows 10 \/ Windows Server 2016 from 2026\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/release-notes-and-product-updates\/ikarus-anti-virus-changes-in-support-for-windows-10-windows-server-2016-from-2026\/' title='IKARUS anti.virus: Changes in Support for Windows 10 \/ Windows Server 2016 from 2026'>IKARUS anti.virus: Changes in Support for Windows 10 \/ Windows Server 2016 from 2026<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-10-31T10:52:06+01:00\" >31. October 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>0<\/span>\n\t\t\t\t\t\t<span itemprop='width'>0<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-01-11T10:40:51+01:00\" >2025-10-31 10:52:06<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-10-31 10:52:06<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>IKARUS anti.virus: Changes in Support for Windows 10 \/ Windows Server 2016 from 2026<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-43501 slide-entry-overview slide-loop-16 slide-parity-even  post-entry-last  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/career\/full-stack-engineer\/' data-rel='slide-1' class='slide-image' title='Full Stack Engineer'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"201\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-300x201.jpg\" class=\"wp-image-43494 avia-img-lazy-loading-not-43494 attachment-medium size-medium wp-post-image\" alt=\"Full Stack Engineer\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600-300x201.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Full Stack Engineer\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/career\/full-stack-engineer\/' title='Full Stack Engineer'>Full Stack Engineer<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-10-20T10:48:30+02:00\" >20. October 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/Full-Stack-Engineer-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>401<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2023-01-11T10:40:51+01:00\" >2025-10-20 10:48:30<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-27 13:49:47<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Full Stack Engineer<\/span><\/span><\/span><\/article><\/div><\/div><div class='avia-slideshow-arrows avia-slideshow-controls' ><a href='#prev' class='prev-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='left-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Previous\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-24' aria-describedby='av-svg-desc-24' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-24'>Previous<\/title>\n<desc id='av-svg-desc-24'>Previous<\/desc>\n<path d=\"M14.464 27.84q0.832 0.832 0 1.536-0.832 0.832-1.536 0l-12.544-12.608q-0.768-0.768 0-1.6l12.544-12.608q0.704-0.832 1.536 0 0.832 0.704 0 1.536l-11.456 11.904z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Previous<\/span><\/a><a href='#next' class='next-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Next\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-25' aria-describedby='av-svg-desc-25' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-25'>Next<\/title>\n<desc id='av-svg-desc-25'>Next<\/desc>\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Next<\/span><\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":25918,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[75,43],"tags":[],"class_list":["post-25921","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security-en","category-security-news-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Prevent credential stuffing and password spraying<\/title>\n<meta name=\"description\" content=\"Credential stuffing and password spraying abuse leaked user information. Protect your user accounts and online services!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prevent credential stuffing and password spraying\" \/>\n<meta property=\"og:description\" content=\"Credential stuffing and password spraying abuse leaked user information. Protect your user accounts and online services!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-11T09:40:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-23T08:48:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/01\/password-spraying.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"526\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"IKARUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"IKARUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/credential-stuffing-and-password-spraying\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/credential-stuffing-and-password-spraying\\\/\"},\"author\":{\"name\":\"IKARUS\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/person\\\/3b18fdbae4d8580428091cd8d593847d\"},\"headline\":\"Credential stuffing and password spraying\",\"datePublished\":\"2023-01-11T09:40:51+00:00\",\"dateModified\":\"2025-07-23T08:48:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/credential-stuffing-and-password-spraying\\\/\"},\"wordCount\":1821,\"publisher\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/credential-stuffing-and-password-spraying\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/password-spraying.png\",\"articleSection\":[\"IT Security\",\"Security news\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/credential-stuffing-and-password-spraying\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/credential-stuffing-and-password-spraying\\\/\",\"name\":\"Prevent credential stuffing and password spraying\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/credential-stuffing-and-password-spraying\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/credential-stuffing-and-password-spraying\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/password-spraying.png\",\"datePublished\":\"2023-01-11T09:40:51+00:00\",\"dateModified\":\"2025-07-23T08:48:13+00:00\",\"description\":\"Credential stuffing and password spraying abuse leaked user information. Protect your user accounts and online services!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/credential-stuffing-and-password-spraying\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/credential-stuffing-and-password-spraying\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/credential-stuffing-and-password-spraying\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/password-spraying.png\",\"contentUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/password-spraying.png\",\"width\":500,\"height\":526,\"caption\":\"Password Spraying\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/security-news-en\\\/credential-stuffing-and-password-spraying\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Credential stuffing and password spraying\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ikarusantivirussoftware\",\"https:\\\/\\\/x.com\\\/ikarusantivirus\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ikarus-security-software-gmbh\",\"https:\\\/\\\/www.xing.com\\\/pages\\\/ikarussecuritysoftwaregmbh\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/person\\\/3b18fdbae4d8580428091cd8d593847d\",\"name\":\"IKARUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6f22583f67ed3af894335875ae3a56e01561089ba459fce332552bcf8e5ec428?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6f22583f67ed3af894335875ae3a56e01561089ba459fce332552bcf8e5ec428?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6f22583f67ed3af894335875ae3a56e01561089ba459fce332552bcf8e5ec428?s=96&d=mm&r=g\",\"caption\":\"IKARUS\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Prevent credential stuffing and password spraying","description":"Credential stuffing and password spraying abuse leaked user information. Protect your user accounts and online services!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/","og_locale":"en_US","og_type":"article","og_title":"Prevent credential stuffing and password spraying","og_description":"Credential stuffing and password spraying abuse leaked user information. Protect your user accounts and online services!","og_url":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_published_time":"2023-01-11T09:40:51+00:00","article_modified_time":"2025-07-23T08:48:13+00:00","og_image":[{"width":500,"height":526,"url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/01\/password-spraying.png","type":"image\/png"}],"author":"IKARUS","twitter_card":"summary_large_image","twitter_creator":"@ikarusantivirus","twitter_site":"@ikarusantivirus","twitter_misc":{"Written by":"IKARUS","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/#article","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/"},"author":{"name":"IKARUS","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/person\/3b18fdbae4d8580428091cd8d593847d"},"headline":"Credential stuffing and password spraying","datePublished":"2023-01-11T09:40:51+00:00","dateModified":"2025-07-23T08:48:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/"},"wordCount":1821,"publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/01\/password-spraying.png","articleSection":["IT Security","Security news"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/","url":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/","name":"Prevent credential stuffing and password spraying","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/#primaryimage"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/01\/password-spraying.png","datePublished":"2023-01-11T09:40:51+00:00","dateModified":"2025-07-23T08:48:13+00:00","description":"Credential stuffing and password spraying abuse leaked user information. Protect your user accounts and online services!","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/#primaryimage","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/01\/password-spraying.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/01\/password-spraying.png","width":500,"height":526,"caption":"Password Spraying"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/credential-stuffing-and-password-spraying\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"Credential stuffing and password spraying"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]},{"@type":"Person","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/person\/3b18fdbae4d8580428091cd8d593847d","name":"IKARUS","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6f22583f67ed3af894335875ae3a56e01561089ba459fce332552bcf8e5ec428?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6f22583f67ed3af894335875ae3a56e01561089ba459fce332552bcf8e5ec428?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f22583f67ed3af894335875ae3a56e01561089ba459fce332552bcf8e5ec428?s=96&d=mm&r=g","caption":"IKARUS"}}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/25921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=25921"}],"version-history":[{"count":10,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/25921\/revisions"}],"predecessor-version":[{"id":42388,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/25921\/revisions\/42388"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media\/25918"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=25921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/categories?post=25921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=25921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}