{"id":31854,"date":"2024-01-12T10:50:41","date_gmt":"2024-01-12T09:50:41","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/?p=31854"},"modified":"2025-06-27T11:56:29","modified_gmt":"2025-06-27T09:56:29","slug":"sql-injection-attacks-by-malicious-code-in-website-requests","status":"publish","type":"post","link":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/","title":{"rendered":"SQL Injection: Attacks by malicious code in website requests"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-10w0ne-83275210999af2721c3b7a850c3db44d entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkwvcm-b29a06cc5e4f0b9ee2456e7f226ada7d\">\n.flex_cell.av-jumkwvcm-b29a06cc5e4f0b9ee2456e7f226ada7d{\nvertical-align:middle;\nheight:200px;\nmin-height:200px;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkwvcm-b29a06cc5e4f0b9ee2456e7f226ada7d{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkwvcm-b29a06cc5e4f0b9ee2456e7f226ada7d av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkxgop-1cfc753a53e5d0d35f1c1af0d3380d44\">\n.flex_cell.av-jumkxgop-1cfc753a53e5d0d35f1c1af0d3380d44{\nvertical-align:top;\nheight:200px;\nmin-height:200px;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkxgop-1cfc753a53e5d0d35f1c1af0d3380d44{\npadding:60px 30px 60px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkxgop-1cfc753a53e5d0d35f1c1af0d3380d44 av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kl9zwv8x-e1a63e797f9332541ddf79b9c84cae42\">\n#top .av-special-heading.av-kl9zwv8x-e1a63e797f9332541ddf79b9c84cae42{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-kl9zwv8x-e1a63e797f9332541ddf79b9c84cae42 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-kl9zwv8x-e1a63e797f9332541ddf79b9c84cae42 .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-kl9zwv8x-e1a63e797f9332541ddf79b9c84cae42 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-kl9zwv8x-e1a63e797f9332541ddf79b9c84cae42 .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-kl9zwv8x-e1a63e797f9332541ddf79b9c84cae42 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-kl9zwv8x-e1a63e797f9332541ddf79b9c84cae42 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-kl9zwv8x-e1a63e797f9332541ddf79b9c84cae42 av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-3  el_before_av_textblock  avia-builder-el-first  av-inherit-size av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >SQL Injection: Attacks by malicious code in website requests<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jy8jdxp7-9cb3daed7ee04a6bde8ee05c4fa7a0d2\">\n#top .av_textblock_section.av-jy8jdxp7-9cb3daed7ee04a6bde8ee05c4fa7a0d2 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-jy8jdxp7-9cb3daed7ee04a6bde8ee05c4fa7a0d2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" >12. January, 2024\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-2'  class='av-layout-grid-container av-10w0ne-4-f903112fccbe8d02b1396e7a3e98fa28 entry-content-wrapper main_color av-fixed-cells  avia-builder-el-5  el_after_av_layout_row  el_before_av_textblock  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkwvcm-3-b266ceb12c9659e9a2c2f27338ebc70f\">\n.flex_cell.av-jumkwvcm-3-b266ceb12c9659e9a2c2f27338ebc70f{\nvertical-align:top;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkwvcm-3-b266ceb12c9659e9a2c2f27338ebc70f{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkwvcm-3-b266ceb12c9659e9a2c2f27338ebc70f av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-6  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jumkxgop-2-c2b9dfd49a7eea46ea3af0af91ff33db\">\n.flex_cell.av-jumkxgop-2-c2b9dfd49a7eea46ea3af0af91ff33db{\nvertical-align:top;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-jumkxgop-2-c2b9dfd49a7eea46ea3af0af91ff33db{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-jumkxgop-2-c2b9dfd49a7eea46ea3af0af91ff33db av-gridrow-cell av_one_half no_margin  avia-builder-el-7  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<\/div><div id='after_grid_row_2'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-31854'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-jy8jdxp7-1-0c0b66f1b66ec4ee551b7b09b5dfeebd '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><strong>SQL injection is the insertion of SQL code into a website to access the SQL databases behind it. This allows data to be read, but also modified or deleted. As this form of attack is very easy to carry out, it is widespread.<\/strong><\/p>\n<p>Today&#8217;s websites and web-based services typically use a two-tier architecture: In the foreground is the website with the server that communicates with the user&#8217;s device and handles the display. In the background, there is usually one or more servers with databases that store various additional information and provide other services.<\/p>\n<p>This two-tier model is supposed to ensure that sensitive data is protected from attacks in the background. However, errors in web programming can sometimes easily bypass this separation. Since databases contain much more information than is displayed on the website, they are very attractive to attackers.<\/p>\n<h3>SQL injection is one of the most common cyber attacks<\/h3>\n<p>A popular method of such attacks is known as &#8220;injection&#8221;. By inserting special codes, commands and characters into login fields or the URL sent to the browser, a website can be made to do things it should not. Appropriate controls on the web server should prevent this. All too often, however, the necessary precautions and controls are forgotten when user data is entered. As a result, the &#8220;injection&#8221; vulnerability is ranked third among the top 10 website security vulnerabilities in 2021. <a href=\"#ftn1\">[1]<\/a><\/p>\n<p>There are several attack vectors that work by inserting additional commands. For example, malicious code can be injected through the login window of a web site. An attempt is made to exploit the underlying Lightweight Directory Access Protocol (LDAP) (LDAP injection).\u00a0 With the appropriate commands, a user&#8217;s privileges can be elevated on unprotected systems, data can be modified, or new accounts can be created. To protect web sites and forms, it is therefore advisable to validate user input, for example by excluding certain characters from the query. The global non-profit organization OWASP (Open Web Application Security Project) has published specific recommendations on how login processes with LDAP can be made more secure. <a href=\"#ftn2\">[2]<\/a><\/p>\n<h3>Attacks on authentication and user data<\/h3>\n<p>It is often interesting for cyber criminals to &#8216;snoop&#8217; directly into the database. Many systems use the standard SQL query language, which is understood by many databases. If an attacker succeeds in passing such commands directly to the system in the background by exploiting one or more programme and security vulnerabilities, unforeseen effects are possible. <a href=\"#ftn3\">[3]<\/a> Many scenarios are imaginable, from reading entire databases to infiltrating and manipulating information. It is therefore crucial to protect against these attacks by implementing robust security measures as a preventative measure. This helps to protect sensitive applications and data from potential attacks. <a href=\"#ftn4\">[4]<\/a><\/p>\n<p>In general, any user input can be used to inject malicious code. SQL injection in particular is common in PHP and ASP applications due to the widespread use of older functional interfaces. Other platforms may be more robust due to more recent developments. However, other systems may also be affected: XML databases can have similar issues (e.g. XPath and XQuery injection). Basic security measures also apply to these databases. The vulnerability of your own systems can also be determined by actively testing the security of web pages or forms. Experts try to anticipate typical problems with user input and access to additional sub-pages.<\/p>\n<h3>Top 3 countermeasures against SQL injection<\/h3>\n<p>The best precaution is to make the applications that access the underlying databases secure and restrictive in the first place. The focus is on improving the security of web services. OWASP provides a wealth of freely available information on how to identify and eliminate security vulnerabilities and risks in web applications. The following three methods are recommended in the \u201c<a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/SQL_Injection_Prevention_Cheat_Sheet.html\">Cheat Sheet<\/a>\u201c to prevent injection:<\/p>\n<ul>\n<li>Only use prepared statements for database queries.<\/li>\n<li>Use only correct procedures with very restricted parameters.<\/li>\n<li>Always validate user input as accurately as possible.<\/li>\n<\/ul>\n<p>Also note the important basic principle of only granting the visibility and access rights to data that are required.<\/p>\n<p>The focus should always be on secure development and regular vulnerability testing. Web applications should have only the minimum rights and visibility of data required to perform the task at hand. This is because the development of an application is often started with admin rights, and then no security-related adjustments are made in the production system. The secure implementation and configuration of the database in the background must also not be neglected and must be checked regularly.<\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-19vaety-aa32046d804bdba787a126afafb42e96\">\n#top .hr.hr-invisible.av-19vaety-aa32046d804bdba787a126afafb42e96{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-19vaety-aa32046d804bdba787a126afafb42e96 hr-invisible  avia-builder-el-9  el_before_av_hr  avia-builder-el-first '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<p><strong>This might also interest you:<\/strong><\/p>\n<p><a href=\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ten-tips-for-an-improved-website-security\/\">Ten tips for an improved website security<\/a><br \/>\n<a href=\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/recognise-understand-and-defend-against-info-stealers\/\">Recognise, understand and defend against info stealers<\/a><br \/>\n<a href=\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/data-loss-prevention-protecting-data-from-loss-and-unauthorised-access\/\">Data Loss Prevention: Protecting data from loss and unauthorised access<\/a><\/p>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-p8dq6u-967755f873586cbef3b79a46416f53dd\">\n#top .hr.hr-invisible.av-p8dq6u-967755f873586cbef3b79a46416f53dd{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-p8dq6u-967755f873586cbef3b79a46416f53dd hr-invisible  avia-builder-el-10  el_after_av_hr  avia-builder-el-last '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<p><small> <strong>Sources:<\/strong> <\/small><br \/>\n<small> <a id=\"ftn1\" href=\"https:\/\/www.heise.de\/hintergrund\/Sicherheitsbedrohungen-im-Web-Die-groessten-Risiken-laut-OWASP-Top-Ten-2021-6271591.html\" target=\"_blank\" rel=\"noopener noreferrer\">[1] https:\/\/www.heise.de\/hintergrund\/Sicherheitsbedrohungen-im-Web-Die-groessten-Risiken-laut-OWASP-Top-Ten-2021-6271591.html<\/a><\/small><br \/>\n<small> <a id=\"ftn2\" href=\"https:\/\/owasp.org\/www-community\/attacks\/LDAP_Injection\" target=\"_blank\" rel=\"noopener noreferrer\">[2] https:\/\/owasp.org\/www-community\/attacks\/LDAP_Injection<\/a><\/small><br \/>\n<small> <a id=\"ftn3\" href=\"https:\/\/www.w3schools.com\/sql\/sql_injection.asp\" target=\"_blank\" rel=\"noopener noreferrer\">[3] https:\/\/www.w3schools.com\/sql\/sql_injection.asp<\/a><\/small><br \/>\n<small> <a id=\"ftn4\" href=\"https:\/\/owasp.org\/www-community\/attacks\/SQL_Injection\" target=\"_blank\" rel=\"noopener noreferrer\">[4] https:\/\/owasp.org\/www-community\/attacks\/SQL_Injection<\/a><\/small><\/p>\n<\/div><\/section>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-klkqz9z1-d0456ab5832fa5d0be2edd96410f9df4\">\n#top .hr.hr-invisible.av-klkqz9z1-d0456ab5832fa5d0be2edd96410f9df4{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-klkqz9z1-d0456ab5832fa5d0be2edd96410f9df4 hr-invisible  avia-builder-el-11  el_after_av_textblock  el_before_av_button '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<div  class='avia-button-wrap av-klkqvzoc-527b3e654c3fafcb2d5263ff7ebc91ee-wrap avia-button-left  avia-builder-el-12  el_after_av_hr  el_before_av_postslider '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-klkqvzoc-527b3e654c3fafcb2d5263ff7ebc91ee\">\n#top #wrap_all .avia-button.av-klkqvzoc-527b3e654c3fafcb2d5263ff7ebc91ee{\nbackground-color:#0993ba;\nborder-color:#0993ba;\ncolor:#ffffff;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-klkqvzoc-527b3e654c3fafcb2d5263ff7ebc91ee .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<a href='https:\/\/www.ikarussecurity.com\/en\/security-news\/newsletter\/'  class='avia-button av-klkqvzoc-527b3e654c3fafcb2d5263ff7ebc91ee av-link-btn avia-icon_select-no avia-size-small avia-position-left'   aria-label=\"Security tips conveniently in your inbox: Subscribe to IKARUS News now\"><span class='avia_iconbox_title' >Security tips conveniently in your inbox: Subscribe to IKARUS News now<\/span><\/a><\/div>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:&quot;5&quot;,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-slider-active avia-content-slider1 avia-content-slider-even  avia-builder-el-13  el_after_av_button  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-44708 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/cyber-threats-in-europe\/' data-rel='slide-1' class='slide-image' title='Cyber Threats in Europe'><img decoding=\"async\" fetchpriority=\"high\" width=\"212\" height=\"300\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/ENISA-Threat-Landscape-Report-2025--212x300.png\" class=\"wp-image-44704 avia-img-lazy-loading-not-44704 attachment-medium size-medium wp-post-image\" alt=\"ENISA Threat Landscape Report 2025\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/ENISA-Threat-Landscape-Report-2025--212x300.png 212w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/ENISA-Threat-Landscape-Report-2025-.png 300w\" sizes=\"(max-width: 212px) 100vw, 212px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Cyber Threats in Europe\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/cyber-threats-in-europe\/' title='Cyber Threats in Europe'>Cyber Threats in Europe<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-10T10:49:24+01:00\" >10. March 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/ENISA-Threat-Landscape-Report-2025-.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>424<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T10:50:41+01:00\" >2026-03-10 10:49:24<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-10 11:06:01<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Cyber Threats in Europe<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44622 slide-entry-overview slide-loop-2 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-company-name-and-new-office-address-as-of-march-1-2026\/' data-rel='slide-1' class='slide-image' title='New Company Name and New Office Address as of March 1, 2026'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"72\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350-300x72.png\" class=\"wp-image-44613 avia-img-lazy-loading-not-44613 attachment-medium size-medium wp-post-image\" alt=\"IKARUS Security\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350-300x72.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350.png 350w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: New Company Name and New Office Address as of March 1, 2026\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/new-company-name-and-new-office-address-as-of-march-1-2026\/' title='New Company Name and New Office Address as of March 1, 2026'>New Company Name and New Office Address as of March 1, 2026<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-02T10:06:20+01:00\" >2. March 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/03\/IKARUS_Logo-red-rgb-350.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>84<\/span>\n\t\t\t\t\t\t<span itemprop='width'>350<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T10:50:41+01:00\" >2026-03-02 10:06:20<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-02 10:06:29<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>New Company Name and New Office Address as of March 1, 2026<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44362 slide-entry-overview slide-loop-3 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/bsi-certified-edr-agent-for-harfanglab-guard-feat-ikarus\/' data-rel='slide-1' class='slide-image' title='BSI-certified EDR agent for HarfangLab Guard feat. IKARUS'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"300\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019-300x300.png\" class=\"wp-image-44368 avia-img-lazy-loading-not-44368 attachment-medium size-medium wp-post-image\" alt=\"BSI-Certification\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019-300x300.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019-80x80.png 80w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019-36x36.png 36w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019-180x180.png 180w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019-705x705.png 705w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019.png 752w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: BSI-certified EDR agent for HarfangLab Guard feat. IKARUS\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/bsi-certified-edr-agent-for-harfanglab-guard-feat-ikarus\/' title='BSI-certified EDR agent for HarfangLab Guard feat. IKARUS'>BSI-certified EDR agent for HarfangLab Guard feat. IKARUS<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-02-02T16:12:31+01:00\" >2. February 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/BSI-DSZ-BSZ-0021-2025_IT-Sicherheitszertifikat_eng12019.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>753<\/span>\n\t\t\t\t\t\t<span itemprop='width'>752<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T10:50:41+01:00\" >2026-02-02 16:12:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-02-02 16:18:51<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>BSI-certified EDR agent for HarfangLab Guard feat. IKARUS<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44284 slide-entry-overview slide-loop-4 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/austrian-universities-move-toward-european-endpoint-security-with-data-sovereignty\/' data-rel='slide-1' class='slide-image' title='Austrian Universities Move Toward European Endpoint Security with Data Sovereignty'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"214\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-300x214.jpg\" class=\"wp-image-35536 avia-img-lazy-loading-not-35536 attachment-medium size-medium wp-post-image\" alt=\"HarfangLab Guard\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-300x214.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400-260x185.jpg 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Austrian Universities Move Toward European Endpoint Security with Data Sovereignty\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/austrian-universities-move-toward-european-endpoint-security-with-data-sovereignty\/' title='Austrian Universities Move Toward European Endpoint Security with Data Sovereignty'>Austrian Universities Move Toward European Endpoint Security with Data Sovereignty<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-01-27T11:45:07+01:00\" >27. January 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/10\/HarfangLab-Guard-400.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>285<\/span>\n\t\t\t\t\t\t<span itemprop='width'>400<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T10:50:41+01:00\" >2026-01-27 11:45:07<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-01-27 11:47:47<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Austrian Universities Move Toward European Endpoint Security with Data Sovereignty<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-44159 slide-entry-overview slide-loop-5 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/attack-surface-management-asm\/' data-rel='slide-1' class='slide-image' title='Attack Surface Management (ASM)'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"234\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600-300x234.jpg\" class=\"wp-image-44156 avia-img-lazy-loading-not-44156 attachment-medium size-medium wp-post-image\" alt=\"Attack Surface Management (ASM)\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600-300x234.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Attack Surface Management (ASM)\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/attack-surface-management-asm\/' title='Attack Surface Management (ASM)'>Attack Surface Management (ASM)<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-12-09T11:49:31+01:00\" >9. December 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/Attack-Surface-Management-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>467<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T10:50:41+01:00\" >2025-12-09 11:49:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-12-09 11:49:32<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Attack Surface Management (ASM)<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-44134 slide-entry-overview slide-loop-6 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/digital-sovereignty-in-practice-ikarus-and-harfanglab-as-a-success-story-for-european-cybersecurity\/' data-rel='slide-1' class='slide-image' title='Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"200\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-300x200.jpg\" class=\"wp-image-44018 avia-img-lazy-loading-not-44018 attachment-medium size-medium wp-post-image\" alt=\"IKARUS CEO Joe Pichlmayr and Gr\u00e9goire Germain\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-300x200.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-1030x687.jpg 1030w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-768x512.jpg 768w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-1536x1025.jpg 1536w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-1500x1001.jpg 1500w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048-705x470.jpg 705w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/digital-sovereignty-in-practice-ikarus-and-harfanglab-as-a-success-story-for-european-cybersecurity\/' title='Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity'>Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-12-03T11:57:52+01:00\" >3. December 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/12\/1-_NDI9048.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1281<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1920<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T10:50:41+01:00\" >2025-12-03 11:57:52<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-12-03 11:57:53<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Digital sovereignty in practice: IKARUS and HarfangLab as a success story for European cybersecurity<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-43945 slide-entry-overview slide-loop-7 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ikarus-named-emea-mssp-of-the-year-2025-by-nozomi-networks\/' data-rel='slide-1' class='slide-image' title='IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"212\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-300x212.png\" class=\"wp-image-43850 avia-img-lazy-loading-not-43850 attachment-medium size-medium wp-post-image\" alt=\"NOZOMI EMEA MSSP Award 2025\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-300x212.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web.png 595w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ikarus-named-emea-mssp-of-the-year-2025-by-nozomi-networks\/' title='IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks'>IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-11-24T12:36:31+01:00\" >24. November 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/NOZOMI-EMEA-MSSP-Award-2025-web.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>420<\/span>\n\t\t\t\t\t\t<span itemprop='width'>595<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T10:50:41+01:00\" >2025-11-24 12:36:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-11-24 12:36:31<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>IKARUS Named \u2018EMEA MSSP of the Year 2025\u2019 by Nozomi Networks<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-43752 slide-entry-overview slide-loop-8 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ascon-new-nist-standard-for-lightweight-iot-cryptography\/' data-rel='slide-1' class='slide-image' title='ASCON: New NIST Standard for Lightweight IoT Cryptography'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"130\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/iot-general-300x130.jpg\" class=\"wp-image-43747 avia-img-lazy-loading-not-43747 attachment-medium size-medium wp-post-image\" alt=\"ASCON: Neuer NIST-Standard f\u00fcr leichtgewichtige IoT-Kryptografie\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/iot-general-300x130.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/iot-general.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: ASCON: New NIST Standard for Lightweight IoT Cryptography\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ascon-new-nist-standard-for-lightweight-iot-cryptography\/' title='ASCON: New NIST Standard for Lightweight IoT Cryptography'>ASCON: New NIST Standard for Lightweight IoT Cryptography<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-11-07T11:46:41+01:00\" >7. November 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/11\/iot-general.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>260<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T10:50:41+01:00\" >2025-11-07 11:46:41<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-11-07 11:46:53<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>ASCON: New NIST Standard for Lightweight IoT Cryptography<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-43212 slide-entry-overview slide-loop-9 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/the-interaction-between-firewall-and-email-security\/' data-rel='slide-1' class='slide-image' title='The Interaction Between Firewall and Email Security'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"200\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/mail-security-firewall-300x200.jpg\" class=\"wp-image-43202 avia-img-lazy-loading-not-43202 attachment-medium size-medium wp-post-image\" alt=\"Zusammenspiel von Firewall und E-Mail Security\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/mail-security-firewall-300x200.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/mail-security-firewall.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: The Interaction Between Firewall and Email Security\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/the-interaction-between-firewall-and-email-security\/' title='The Interaction Between Firewall and Email Security'>The Interaction Between Firewall and Email Security<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-10-06T16:04:08+02:00\" >6. October 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/10\/mail-security-firewall.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>400<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T10:50:41+01:00\" >2025-10-06 16:04:08<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-10-06 16:04:08<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>The Interaction Between Firewall and Email Security<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-42739 slide-entry-overview slide-loop-10 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/customer-information-acquisition-of-nozomi-networks-by-mitsubishi-electric\/' data-rel='slide-1' class='slide-image' title='Customer Information: Acquisition of Nozomi Networks by Mitsubishi Electric'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"200\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/09\/Mitsubishi_Electric-Nozomi-300x200.png\" class=\"wp-image-42736 avia-img-lazy-loading-not-42736 attachment-medium size-medium wp-post-image\" alt=\"Mitsubishi Electric-Nozomi\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/09\/Mitsubishi_Electric-Nozomi-300x200.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/09\/Mitsubishi_Electric-Nozomi.png 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Customer Information: Acquisition of Nozomi Networks by Mitsubishi Electric\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/customer-information-acquisition-of-nozomi-networks-by-mitsubishi-electric\/' title='Customer Information: Acquisition of Nozomi Networks by Mitsubishi Electric'>Customer Information: Acquisition of Nozomi Networks by Mitsubishi Electric<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-09-10T14:06:59+02:00\" >10. September 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/09\/Mitsubishi_Electric-Nozomi.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>400<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T10:50:41+01:00\" >2025-09-10 14:06:59<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-09-10 14:07:00<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Customer Information: Acquisition of Nozomi Networks by Mitsubishi Electric<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-42542 slide-entry-overview slide-loop-11 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/watering-hole-attacks-how-they-work-the-risks-and-protection-strategies\/' data-rel='slide-1' class='slide-image' title='Watering Hole Attacks: How They Work, the Risks, and Protection Strategies'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"200\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/08\/WildeTiere-Wasserloch-600-300x200.jpg\" class=\"wp-image-42537 avia-img-lazy-loading-not-42537 attachment-medium size-medium wp-post-image\" alt=\"Watering Hole Attacks\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/08\/WildeTiere-Wasserloch-600-300x200.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/08\/WildeTiere-Wasserloch-600.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Watering Hole Attacks: How They Work, the Risks, and Protection Strategies\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/watering-hole-attacks-how-they-work-the-risks-and-protection-strategies\/' title='Watering Hole Attacks: How They Work, the Risks, and Protection Strategies'>Watering Hole Attacks: How They Work, the Risks, and Protection Strategies<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-08-13T11:17:17+02:00\" >13. August 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/08\/WildeTiere-Wasserloch-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>400<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T10:50:41+01:00\" >2025-08-13 11:17:17<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-08-13 11:17:19<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Watering Hole Attacks: How They Work, the Risks, and Protection Strategies<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-42354 slide-entry-overview slide-loop-12 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/legacy-systems-how-outdated-hardware-and-software-threaten-corporate-security\/' data-rel='slide-1' class='slide-image' title='Legacy Systems: How Outdated Hardware and Software Threaten Corporate Security'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"234\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/07\/Computerhardware-aus-den-80ern-auf-einem-Mistplatz-300x234.jpg\" class=\"wp-image-42458 avia-img-lazy-loading-not-42458 attachment-medium size-medium wp-post-image\" alt=\"Legacy Systems\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/07\/Computerhardware-aus-den-80ern-auf-einem-Mistplatz-300x234.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/07\/Computerhardware-aus-den-80ern-auf-einem-Mistplatz.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Legacy Systems: How Outdated Hardware and Software Threaten Corporate Security\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/legacy-systems-how-outdated-hardware-and-software-threaten-corporate-security\/' title='Legacy Systems: How Outdated Hardware and Software Threaten Corporate Security'>Legacy Systems: How Outdated Hardware and Software Threaten Corporate Security<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-07-24T13:18:21+02:00\" >24. July 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/07\/Computerhardware-aus-den-80ern-auf-einem-Mistplatz.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>467<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T10:50:41+01:00\" >2025-07-24 13:18:21<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-07-29 11:09:50<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Legacy Systems: How Outdated Hardware and Software Threaten Corporate Security<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-42269 slide-entry-overview slide-loop-13 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/zero-day-vulnerability-in-windows-shortcuts\/' data-rel='slide-1' class='slide-image' title='Zero-Day Vulnerability in Windows Shortcuts'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"228\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/07\/Windows-Zero-Day-300x228.jpg\" class=\"wp-image-42264 avia-img-lazy-loading-not-42264 attachment-medium size-medium wp-post-image\" alt=\"Windows Zero-Day Vulnerability\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/07\/Windows-Zero-Day-300x228.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/07\/Windows-Zero-Day-768x583.jpg 768w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/07\/Windows-Zero-Day-705x535.jpg 705w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/07\/Windows-Zero-Day.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Zero-Day Vulnerability in Windows Shortcuts\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/zero-day-vulnerability-in-windows-shortcuts\/' title='Zero-Day Vulnerability in Windows Shortcuts'>Zero-Day Vulnerability in Windows Shortcuts<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-07-10T13:23:13+02:00\" >10. July 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/07\/Windows-Zero-Day.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>607<\/span>\n\t\t\t\t\t\t<span itemprop='width'>800<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T10:50:41+01:00\" >2025-07-10 13:23:13<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-07-10 13:23:15<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Zero-Day Vulnerability in Windows Shortcuts<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-41786 slide-entry-overview slide-loop-14 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/owasp-top-10-for-llms-new-security-challenges-due-to-ai\/' data-rel='slide-1' class='slide-image' title='OWASP Top 10 for LLMs: New Security Challenges due to AI'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"164\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/06\/OWASP-Top-10-300x164.jpg\" class=\"wp-image-41783 avia-img-lazy-loading-not-41783 attachment-medium size-medium wp-post-image\" alt=\"OWASP Top 10 f\u00fcr LLMs\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/06\/OWASP-Top-10-300x164.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/06\/OWASP-Top-10.jpg 304w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: OWASP Top 10 for LLMs: New Security Challenges due to AI\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/owasp-top-10-for-llms-new-security-challenges-due-to-ai\/' title='OWASP Top 10 for LLMs: New Security Challenges due to AI'>OWASP Top 10 for LLMs: New Security Challenges due to AI<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-06-18T14:37:55+02:00\" >18. June 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/06\/OWASP-Top-10.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>166<\/span>\n\t\t\t\t\t\t<span itemprop='width'>304<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T10:50:41+01:00\" >2025-06-18 14:37:55<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-20 11:03:57<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>OWASP Top 10 for LLMs: New Security Challenges due to AI<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-41615 slide-entry-overview slide-loop-15 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ikarus-malware-scanner-now-part-of-heise-desinfect\/' data-rel='slide-1' class='slide-image' title='IKARUS malware.scanner now part of Heise Desinfec\u2019t'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"162\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/06\/Desinfect2025-300x162.png\" class=\"wp-image-41634 avia-img-lazy-loading-not-41634 attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/06\/Desinfect2025-300x162.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/06\/Desinfect2025-768x414.png 768w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/06\/Desinfect2025-705x380.png 705w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/06\/Desinfect2025.png 971w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: IKARUS malware.scanner now part of Heise Desinfec\u2019t\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/ikarus-malware-scanner-now-part-of-heise-desinfect\/' title='IKARUS malware.scanner now part of Heise Desinfec\u2019t'>IKARUS malware.scanner now part of Heise Desinfec\u2019t<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-06-11T15:03:11+02:00\" >11. June 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/06\/Desinfect2025.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>524<\/span>\n\t\t\t\t\t\t<span itemprop='width'>971<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T10:50:41+01:00\" >2025-06-11 15:03:11<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-20 11:05:43<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>IKARUS malware.scanner now part of Heise Desinfec\u2019t<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-41179 slide-entry-overview slide-loop-16 slide-parity-even  post-entry-last  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/microsoft-enforces-dmarc-new-delivery-rules-for-high-volume-outlook-emails\/' data-rel='slide-1' class='slide-image' title='Microsoft enforces DMARC: new delivery rules for high-volume Outlook emails'><img decoding=\"async\" fetchpriority=\"high\" width=\"300\" height=\"150\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/05\/e-Mail-Laptop-600-300x150.jpg\" class=\"wp-image-41170 avia-img-lazy-loading-not-41170 attachment-medium size-medium wp-post-image\" alt=\"Microsoft erzwingt DMARC\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/05\/e-Mail-Laptop-600-300x150.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/05\/e-Mail-Laptop-600.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Microsoft enforces DMARC: new delivery rules for high-volume Outlook emails\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/microsoft-enforces-dmarc-new-delivery-rules-for-high-volume-outlook-emails\/' title='Microsoft enforces DMARC: new delivery rules for high-volume Outlook emails'>Microsoft enforces DMARC: new delivery rules for high-volume Outlook emails<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-05-06T11:22:27+02:00\" >6. May 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/05\/e-Mail-Laptop-600.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>300<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T10:50:41+01:00\" >2025-05-06 11:22:27<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-20 11:06:47<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Microsoft enforces DMARC: new delivery rules for high-volume Outlook emails<\/span><\/span><\/span><\/article><\/div><\/div><div class='avia-slideshow-arrows avia-slideshow-controls' ><a href='#prev' class='prev-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='left-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Previous\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-17' aria-describedby='av-svg-desc-17' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-17'>Previous<\/title>\n<desc id='av-svg-desc-17'>Previous<\/desc>\n<path d=\"M14.464 27.84q0.832 0.832 0 1.536-0.832 0.832-1.536 0l-12.544-12.608q-0.768-0.768 0-1.6l12.544-12.608q0.704-0.832 1.536 0 0.832 0.704 0 1.536l-11.456 11.904z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Previous<\/span><\/a><a href='#next' class='next-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Next\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-18' aria-describedby='av-svg-desc-18' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-18'>Next<\/title>\n<desc id='av-svg-desc-18'>Next<\/desc>\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Next<\/span><\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":31838,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[73,75,43],"tags":[],"class_list":["post-31854","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-analyzes-outbreaks","category-it-security-en","category-security-news-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SQL Injection: Attacks by malicious code in website requests<\/title>\n<meta name=\"description\" content=\"SQL injection, the insertion of malicious code into website requests, is one of the most common attacks. However, there are effective protective measures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SQL Injection: Attacks by malicious code in website requests\" \/>\n<meta property=\"og:description\" content=\"SQL injection, the insertion of malicious code into website requests, is one of the most common attacks. However, there are effective protective measures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-12T09:50:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-27T09:56:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/sql-injection.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"404\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"IKARUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"IKARUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/\"},\"author\":{\"name\":\"IKARUS\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/person\/3b18fdbae4d8580428091cd8d593847d\"},\"headline\":\"SQL Injection: Attacks by malicious code in website requests\",\"datePublished\":\"2024-01-12T09:50:41+00:00\",\"dateModified\":\"2025-06-27T09:56:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/\"},\"wordCount\":1745,\"publisher\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/sql-injection.png\",\"articleSection\":[\"Analyzes &amp; Outbreaks\",\"IT Security\",\"Security news\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/\",\"name\":\"SQL Injection: Attacks by malicious code in website requests\",\"isPartOf\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/sql-injection.png\",\"datePublished\":\"2024-01-12T09:50:41+00:00\",\"dateModified\":\"2025-06-27T09:56:29+00:00\",\"description\":\"SQL injection, the insertion of malicious code into website requests, is one of the most common attacks. However, there are effective protective measures.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/#primaryimage\",\"url\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/sql-injection.png\",\"contentUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/sql-injection.png\",\"width\":600,\"height\":404,\"caption\":\"SQL Injection\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ikarussecurity.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SQL Injection: Attacks by malicious code in website requests\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#website\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\/\/www.ikarussecurity.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png\",\"contentUrl\":\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ikarusantivirussoftware\",\"https:\/\/x.com\/ikarusantivirus\",\"https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh\",\"https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh\",\"https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/person\/3b18fdbae4d8580428091cd8d593847d\",\"name\":\"IKARUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6f22583f67ed3af894335875ae3a56e01561089ba459fce332552bcf8e5ec428?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f22583f67ed3af894335875ae3a56e01561089ba459fce332552bcf8e5ec428?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f22583f67ed3af894335875ae3a56e01561089ba459fce332552bcf8e5ec428?s=96&d=mm&r=g\",\"caption\":\"IKARUS\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SQL Injection: Attacks by malicious code in website requests","description":"SQL injection, the insertion of malicious code into website requests, is one of the most common attacks. However, there are effective protective measures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/","og_locale":"en_US","og_type":"article","og_title":"SQL Injection: Attacks by malicious code in website requests","og_description":"SQL injection, the insertion of malicious code into website requests, is one of the most common attacks. However, there are effective protective measures.","og_url":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_published_time":"2024-01-12T09:50:41+00:00","article_modified_time":"2025-06-27T09:56:29+00:00","og_image":[{"width":600,"height":404,"url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/sql-injection.png","type":"image\/png"}],"author":"IKARUS","twitter_card":"summary_large_image","twitter_creator":"@ikarusantivirus","twitter_site":"@ikarusantivirus","twitter_misc":{"Written by":"IKARUS","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/#article","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/"},"author":{"name":"IKARUS","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/person\/3b18fdbae4d8580428091cd8d593847d"},"headline":"SQL Injection: Attacks by malicious code in website requests","datePublished":"2024-01-12T09:50:41+00:00","dateModified":"2025-06-27T09:56:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/"},"wordCount":1745,"publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/sql-injection.png","articleSection":["Analyzes &amp; Outbreaks","IT Security","Security news"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/","url":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/","name":"SQL Injection: Attacks by malicious code in website requests","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/#primaryimage"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/sql-injection.png","datePublished":"2024-01-12T09:50:41+00:00","dateModified":"2025-06-27T09:56:29+00:00","description":"SQL injection, the insertion of malicious code into website requests, is one of the most common attacks. However, there are effective protective measures.","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/#primaryimage","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/sql-injection.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/01\/sql-injection.png","width":600,"height":404,"caption":"SQL Injection"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/security-news-en\/sql-injection-attacks-by-malicious-code-in-website-requests\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"SQL Injection: Attacks by malicious code in website requests"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]},{"@type":"Person","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/person\/3b18fdbae4d8580428091cd8d593847d","name":"IKARUS","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6f22583f67ed3af894335875ae3a56e01561089ba459fce332552bcf8e5ec428?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6f22583f67ed3af894335875ae3a56e01561089ba459fce332552bcf8e5ec428?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f22583f67ed3af894335875ae3a56e01561089ba459fce332552bcf8e5ec428?s=96&d=mm&r=g","caption":"IKARUS"}}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/31854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=31854"}],"version-history":[{"count":12,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/31854\/revisions"}],"predecessor-version":[{"id":42024,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/posts\/31854\/revisions\/42024"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media\/31838"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=31854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/categories?post=31854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=31854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}