master.show-navigation
cert.at - Home
  • News
  • Services
  • Incident report
  • Downloads
  • Feeds
  • Links
  • Data Feeds
  • Emails From Us
  • Crawler
  • Statistic Survey
  • Downloads
  • About us
  • Overview
  • Scope
  • Management Team
  • Contact
  • Projects
  • RFC 2350
  • Partners
  • Pressmaterial
  • Austrian Energy Cert
  • Imprint
  • Privacy Policy
  • Accessibility Statement
  • Policies
  • Deutsch
  • English
cert.at - Home
  • News
    • Blog
  • Services
    • Incident report
    • Downloads
    • Feeds
    • Links
    • Data Feeds
    • Emails From Us
    • Crawler
    • Statistic Survey
  • Downloads
    • Software
    • Papers
    • Pressmaterial
  • About us
    • Overview
    • Scope
    • Management Team
    • Contact
    • Projects
    • RFC 2350
    • Partners
    • Pressmaterial
    • Austrian Energy Cert
    • Imprint
    • Privacy Policy
    • Accessibility Statement
    • Policies
  • EN
    • Deutsch
    • English

About us

All information about the national
Computer Emergency Response Team
of Austria.

Incident report

Your company became a target or victim
of an IT-Security-Incident? These are the next steps...

E-Mails from CERT.at

You received an E-Mail
from CERT.at?
These are the next steps...

blog
18.02.2026 Lawful access to encrypted data: General Considerations
Last week, I wrote a blog post on why the problem of lawful access to encrypted data is so tricky, this week I want to continue with a discussion on the general considerations you should keep in mind when thinking about this topic.
blog
12.02.2026 Lawful access to encrypted data: why is this so hard to do?
An interesting train of thought turned out to be the question “We managed to give Law Enforcement (LE) wiretapping powers in old-style phone networks, but not in modern, Internet-based communication services. Why?” I came up with the following reasons:
blog
27.01.2026 Threat actors use FortiCloud SSO bypass to collect LDAP connection passwords
CERT.at gained access to a toolkit of an unknown threat actor targeting FortiCloud SSO bypass in Fortinet appliances (CVE-2025-59718/CVE-2025-59719). We are releasing under TLP:CLEAR key findings about likely post-exploitation goals of the attacker.
blog
22.01.2026 Look at FortiCloud SSO Bypass Exploitation (CVE-2025-59718/59719)
In December last year, Fortinet disclosed a vulnerability in SAML processing, which allowed full bypass of authentication to management interfaces with FortiCloud SSO enabled. According to new, still not officially confirmed reports, the vulnerability may not have been fully patched. As affected devices are represented in my small high-interactive honeypots network, we have an opportunity to take a look at what the attackers do.
Nach oben
CERT.at - Computer Emergency Response Team Austria
A daughter company of nic.at GmbH.

CERT.at GmbH
Karlsplatz 1/2/9
A-1010 Wien
Austria
Phone:
+43 1 5056416 78
E-mail:
team@cert.at
Reports:
reports@cert.at

Imprint Contact Privacy Policy Accessibility Statement

© 2021 CERT.at GmbH