German IT Consultant Fined Thousands for Reporting Security Failing

After discovering and reporting a vulnerability in an e-commerce database that was putting customers and their personal information at risk, a security researcher in Germany was fined €3,000 for doing so.
In 2021, a contractor, known as Hendrik H., said he was troubleshooting software for Modern Solution GmbH when he realized that password access to the remote server was stored in plain text in MSConnext.
This easy access would make the password simple for many to find, and a threat actor could access data to everything stored on the database server, including customer information.
The statement claimed that a limited amount of data was exposed, though some argue that it was much more than this.
Mark Steier, who wrote about the contractor's initial findings for Wortfilter.
De, argued that the vulnerability in Modern Solution was much more serious than the company was conveying it to be.
In September 2023, Hendrik H. was charged with unlawful access according to Germany's Criminal Code, after Modern Solutions made the complaint that he was a competitor who obtained the password through insider knowledge.
The Jülich District Court initially sided with Hendrik H. in June 2023, on the basis that Modern Solution software did not have sufficient protection for the database.
The case was appealed to the Aachen regional court, after which the district court reversed its decision on Jan. 17, leaving Hendrik H. to be fined and in charge of paying court costs.
Hendrik H. reportedly intends to appeal this decision.


This Cyber News was published on www.darkreading.com. Publication date: Mon, 22 Jan 2024 20:30:09 +0000


Cyber News related to German IT Consultant Fined Thousands for Reporting Security Failing

German IT Consultant Fined Thousands for Reporting Security Failing - After discovering and reporting a vulnerability in an e-commerce database that was putting customers and their personal information at risk, a security researcher in Germany was fined €3,000 for doing so. In 2021, a contractor, known as Hendrik H., ...
1 year ago Darkreading.com
IT consultant in Germany fined for exposing shoddy security The Register - A security researcher in Germany has been fined €3,000 for finding and reporting an e-commerce database vulnerability that was exposing almost 700,000 customer records. Back in June 2021, according to our pals at Heise, an contractor identified ...
1 year ago Theregister.com
Top 30 Best Penetration Testing Tools - 2025 - The tool supports various protocols and offers advanced filtering and analysis capabilities, making it ideal for diagnosing network issues, investigating security incidents, and understanding complex network interactions during penetration testing. ...
2 months ago Cybersecuritynews.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
8 months ago Cyberdefensemagazine.com Akira
US DOJ applies carrot-and-stick approach to Foreign Corrupt Practices Act policy - The US Department of Justice has taken a carrot-and-stick approach to its corporate enforcement policy in regard to the Foreign Corrupt Practices Act in an effort to entice companies to self-report when in violation of the FCPA. Assistant Attorney ...
2 years ago Csoonline.com
How CSRD and EED are Reshaping Data Center Sustainability Reporting - It requires companies to prepare annual sustainability reports following the European Sustainability Reporting Standards. The CSRD introduces assurance requirements for sustainability reports, necessitating independent verification by auditors. ...
1 year ago Securityboulevard.com
18 Best Web Filtering Solutions - 2025 - Pros Cons Comprehensive content filtering.Cost can be high for full features.Malware and threat protection.Hardware-based solutions may require additional infrastructure.Easy to deploy and manage.Configuration complexity for advanced ...
3 months ago Cybersecuritynews.com
Apple fined €150 million over App Tracking Transparency issues - Autorité de la concurrence, France's antitrust watchdog, has fined Apple €150 million ($162 million) for using the App Tracking Transparency privacy framework to abuse its dominant market position in mobile app advertising on its devices. ...
2 months ago Bleepingcomputer.com
Biden veto waiting for bill to kill SEC breach report rule The Register - The Biden administration has expressed to congressional representatives its strong opposition to undoing the Securities and Exchange Commission's strict data breach reporting rule. The joint resolution, along with House Joint Resolution 100, ...
1 year ago Go.theregister.com
Mastermind Behind Biden AI Deepfake Indicted for Robocall Scheme - A political consultant identified as the individual who paid for a deepfake robocall created to impersonate US President Joe Biden has been indicted on charges of felony voter suppression as well as misdemeanor impersonation of a candidate. Steven ...
1 year ago Darkreading.com
Report: Organisations Have Endpoint Security Tools But Are Still Falling Short on the Basics - Most IT and security teams would agree that ensuring endpoint security and network access security applications are running in compliance with security policies on managed PCs should be a basic task. A new report from Absolute Security, based on ...
1 year ago Techrepublic.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
1 year ago Feeds.dzone.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
8 months ago Helpnetsecurity.com
TikTok fined €530 million for sending European user data to China - The Irish Data Protection Commission (DPC) has fined TikTok €530 million (over $601 million) for illegally transferring the personal data of users in the European Economic Area (EEA) to China, violating the European Union's GDPR data protection ...
1 month ago Bleepingcomputer.com
Cybersecurity Career Pathways for Students - Whether aspiring to become a cybersecurity analyst, ethical hacker, or security engineer, this article serves as a valuable resource for students aiming to embark on a successful cybersecurity career. As an analyst, students will be responsible for ...
1 year ago Securityzap.com
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
1 year ago Microsoft.com
Why Automation and Consolidation are Key to Restoring Confidence in Cybersecurity - Our research shows that security leaders would need to find a 40% budget increase to restore confidence in their security posture. It's unsurprising that a lack of security skills and budget - both for training as well as general cybersecurity - are ...
1 year ago Securityboulevard.com
The First 10 Days of a vCISO’S Journey with a New Client - Cyber Defense Magazine - During this period, the vCISO conducts a comprehensive assessment to identify vulnerabilities, engages with key stakeholders to align security efforts with business objectives, and develops a strategic roadmap to prioritize actions and resources. If ...
8 months ago Cyberdefensemagazine.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
1 year ago Esecurityplanet.com
CVE-2020-9439 - Multiple cross-site scripting (XSS) vulnerabilities in Uncanny Owl Tin Canny LearnDash Reporting before 3.4.4 allows authenticated remote attackers to inject arbitrary web script or HTML via the search_key GET Parameter in ...
4 years ago
€55 Million European Union Data Breach Fine for Meta Group AG - Meta Group AG recently received a massive fine of €55 million from the European Union for failing to secure its data and avoid a data breach. ...
2 years ago Securityweek.com
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
1 year ago Cybersecuritynews.com
Five business use cases for evaluating Azure Virtual WAN security solutions - To help organizations who are evaluating security solutions to protect their Virtual WAN deployments, this article considers five business use cases and explains how Check Point enhances and complements Azure security with its best-of-breed, ...
1 year ago Blog.checkpoint.com
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
2 months ago Cybersecuritynews.com
No one's happy with latest US cyber incident reporting plan The Register - Organizations that sell IT services to Uncle Sam are peeved at proposed changes to procurement rules that would require them to allow US government agencies full access to their systems in the event of a security incident. The rules were unveiled in ...
1 year ago Go.theregister.com