master.show-navigation
cert.at - Home
  • News
  • Services
  • Incident report
  • Report a vulnerability (CVD)
  • Downloads
  • Feeds
  • Links
  • Data Feeds
  • Emails From Us
  • Crawler
  • Statistic Survey
  • Downloads
  • About us
  • Overview
  • Scope
  • Management Team
  • Contact
  • Projects
  • RFC 2350
  • Partners
  • Pressmaterial
  • Austrian Energy Cert
  • Imprint
  • Privacy Policy
  • Accessibility Statement
  • Policies
  • Deutsch
  • English
cert.at - Home
  • News
    • Blog
  • Services
    • Incident report
    • Report a vulnerability (CVD)
    • Downloads
    • Feeds
    • Links
    • Data Feeds
    • Emails From Us
    • Crawler
    • Statistic Survey
  • Downloads
    • Software
    • Papers
    • Pressmaterial
  • About us
    • Overview
    • Scope
    • Management Team
    • Contact
    • Projects
    • RFC 2350
    • Partners
    • Pressmaterial
    • Austrian Energy Cert
    • Imprint
    • Privacy Policy
    • Accessibility Statement
    • Policies
  • EN
    • Deutsch
    • English

About us

All information about the national
Computer Emergency Response Team
of Austria.

Incident report

Your company became a target or victim
of an IT-Security-Incident? These are the next steps...

E-Mails from CERT.at

You received an E-Mail
from CERT.at?
These are the next steps...

blog
22.02.2026 Incident Reporting: EU-Wide Statistics
At the last CSIRTs Network meeting we got treated to a powerpoint versions of the statistics that ENISA publishes under https://ciras.enisa.europa.eu/ The mathematician inside me was not impressed, and as I’m prone to do, I did not withhold my opinion. This blog post explains why I’m so unhappy with ENISA’s analysis.
blog
18.02.2026 Lawful access to encrypted data: General Considerations
Last week, I wrote a blog post on why the problem of lawful access to encrypted data is so tricky, this week I want to continue with a discussion on the general considerations you should keep in mind when thinking about this topic.
blog
12.02.2026 Lawful access to encrypted data: why is this so hard to do?
An interesting train of thought turned out to be the question “We managed to give Law Enforcement (LE) wiretapping powers in old-style phone networks, but not in modern, Internet-based communication services. Why?” I came up with the following reasons:
blog
27.01.2026 Threat actors use FortiCloud SSO bypass to collect LDAP connection passwords
CERT.at gained access to a toolkit of an unknown threat actor targeting FortiCloud SSO bypass in Fortinet appliances (CVE-2025-59718/CVE-2025-59719). We are releasing under TLP:CLEAR key findings about likely post-exploitation goals of the attacker.
Nach oben
CERT.at - Computer Emergency Response Team Austria
A daughter company of nic.at GmbH.

CERT.at GmbH
Karlsplatz 1/2/9
A-1010 Wien
Austria
Phone:
+43 1 5056416 78
E-mail:
team@cert.at
Reports:
reports@cert.at

Imprint Contact Privacy Policy Accessibility Statement

© 2021 CERT.at GmbH