{"id":17668,"date":"2026-03-17T15:58:49","date_gmt":"2026-03-17T14:58:49","guid":{"rendered":"https:\/\/it-u.at\/?p=17668"},"modified":"2026-03-24T14:05:49","modified_gmt":"2026-03-24T13:05:49","slug":"meet-it-us-ethical-hackers","status":"publish","type":"post","link":"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/","title":{"rendered":"Meet IT:U\u2019s Ethical Hackers\u00a0"},"content":{"rendered":"\n<p><strong>How IT:U\u2019s ethical hackers work on preventing cyber security attacks that could affect us all.<\/strong> &nbsp;<\/p>\n\n\n\n<p>Most people would probably want to protect themselves from hackers. But what about welcoming them, albeit the ethical sort, for the public good? That\u2019s what <a href=\"https:\/\/it-u.at\/en\/research\/professors\/johanna-ullrich\/\">Professor Johanna Ullrich<\/a> and her team of \u2018ethical hackers\u2019 at IT:U are trying to accomplish.&nbsp;<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-copy-small-font-size\">\u201eHacking always has the notion of doing something bad \u2026 but while&nbsp;white hat hackers&nbsp;basically have&nbsp;the same skillset, we want to know if we can overcome a system. But if we do so, we do not steal money or do anything mean, we do responsible disclosure, which is we contact either the operator or vendor and say, \u2018there is something wrong, please fix it\u2019.\u201d<\/p>\n\n\n\n<p class=\"has-copy-small-font-size\"><\/p>\n<cite>Johanna Ullrich, Professor of Security at&nbsp;IT:U.&nbsp;<\/cite><\/blockquote>\n\n\n\n<p>She and her team actively look for and identify security risks, saying \u201cwe get the reward that we found the mistake\u201d.&nbsp;<\/p>\n\n\n\n<p>By doing so, they can help prevent major security breaches, which could end in power outages or a breakdown in other critical infrastructure. &nbsp;<\/p>\n\n\n\n<p>The professor will chair an online conference this month (23&nbsp;to&nbsp;25&nbsp;March), called Passive and Active Measurement Conference 2026, or <a href=\"https:\/\/pam2026.at\/\" target=\"_blank\" rel=\"noreferrer noopener\">PAM 2026<\/a>, where like-minded researchers will meet to gain insight into the state of the internet and its role as critical infrastructure.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Hacking for society\u2019s benefit<\/strong>&nbsp;<\/h3>\n\n\n\n<p>While some people offer their hacking services to organisations for a fee, Professor Ullrich and her team are doing it for the benefit of society.&nbsp;<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-copy-small-font-size\">\u201cSometimes you have companies or institutions that are important for society. They do not feel like they have a problem, but we can educate them that this is an issue, we go after new attack concepts.\u201d&nbsp;<\/p>\n<\/blockquote>\n\n\n\n<p>A few months ago, Professor Ullrich published a <a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3730567.3764449\" target=\"_blank\" rel=\"noreferrer noopener\">research paper on Ukraine<\/a>, where she and her team made attacks on infrastructure visible through their servers in Austria. &nbsp;<\/p>\n\n\n\n<p class=\"has-copy-small-font-size\">*The following chart shows when and where internet disruptions occurred across regions of Ukraine between 2022 and 2025. Each color represents a different network condition: red indicates confirmed outages, green shows other types of disruptions, blue marks routing issues (when internet paths break), gray means normal operation with no outage, and white indicates missing data.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"841\" src=\"https:\/\/it-u.at\/wp-content\/uploads\/2026\/03\/18\/graph_2.1.jpg\" alt=\"\" class=\"wp-image-17682\" srcset=\"https:\/\/it-u.at\/wp-content\/uploads\/2026\/03\/18\/graph_2.1.jpg 1080w, https:\/\/it-u.at\/wp-content\/uploads\/2026\/03\/18\/graph_2.1-300x234.jpg 300w, https:\/\/it-u.at\/wp-content\/uploads\/2026\/03\/18\/graph_2.1-1024x797.jpg 1024w, https:\/\/it-u.at\/wp-content\/uploads\/2026\/03\/18\/graph_2.1-768x598.jpg 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/><span class=\"credits\">&copy; ACM<\/span><\/figure>\n\n\n\n\n<p>Yet this type of research is equally important in many other areas and, according to the Professor, needs to be explored further.&nbsp;<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-copy-small-font-size\">\u201cWe have to talk about our democracy here, we are used to a bunch of working infrastructure, and we want to maintain that for democracy, for wealth, for daily life.\u201d&nbsp;<\/p>\n<\/blockquote>\n\n\n\n<p>She adds that the internet is perceived as reliable but is in fact a fragile infrastructure that needs constant monitoring, ideally by people who work for the benefit of all. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Learn more\/conference details:<\/strong>&nbsp;<\/h3>\n\n\n\n<p>The Passive and Active Measurement Conference 2026, or PAM 2026, is happening from 23&nbsp;to&nbsp;25&nbsp;March&nbsp;and those interested can register and join online.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/pam2026.at\/\">:register here<\/a><\/div>\n<\/div>\n\n\n\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How IT:U\u2019s ethical hackers work on preventing cyber security attacks that could affect us all. &nbsp; Most people would probably want to protect themselves from hackers. But what about welcoming them, albeit the ethical sort, for the public good? That\u2019s what Professor Johanna Ullrich and her team of \u2018ethical hackers\u2019 at IT:U are trying to [&hellip;]<\/p>\n","protected":false},"author":18,"featured_media":17701,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[43],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Meet IT:U\u2019s Ethical Hackers\u00a0 | IT:U<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Meet IT:U\u2019s Ethical Hackers\u00a0 | IT:U\" \/>\n<meta property=\"og:description\" content=\"How IT:U\u2019s ethical hackers work on preventing cyber security attacks that could affect us all. &nbsp; Most people would probably want to protect themselves from hackers. But what about welcoming them, albeit the ethical sort, for the public good? That\u2019s what Professor Johanna Ullrich and her team of \u2018ethical hackers\u2019 at IT:U are trying to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"IT:U\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-17T14:58:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-24T13:05:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/it-u.at\/wp-content\/uploads\/2026\/03\/19\/img_1293-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dubravka Voloder\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dubravka Voloder\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/\"},\"author\":{\"name\":\"Dubravka Voloder\",\"@id\":\"https:\/\/it-u.at\/en\/#\/schema\/person\/2769a3ae6d3967e0a508ef1b629cfc28\"},\"headline\":\"Meet IT:U\u2019s Ethical Hackers\u00a0\",\"datePublished\":\"2026-03-17T14:58:49+00:00\",\"dateModified\":\"2026-03-24T13:05:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/\"},\"wordCount\":501,\"publisher\":{\"@id\":\"https:\/\/it-u.at\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/it-u.at\/wp-content\/uploads\/2026\/03\/19\/img_1293-scaled.jpeg\",\"articleSection\":[\":research news\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/\",\"url\":\"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/\",\"name\":\"Meet IT:U\u2019s Ethical Hackers\u00a0 | IT:U\",\"isPartOf\":{\"@id\":\"https:\/\/it-u.at\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/it-u.at\/wp-content\/uploads\/2026\/03\/19\/img_1293-scaled.jpeg\",\"datePublished\":\"2026-03-17T14:58:49+00:00\",\"dateModified\":\"2026-03-24T13:05:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/#primaryimage\",\"url\":\"https:\/\/it-u.at\/wp-content\/uploads\/2026\/03\/19\/img_1293-scaled.jpeg\",\"contentUrl\":\"https:\/\/it-u.at\/wp-content\/uploads\/2026\/03\/19\/img_1293-scaled.jpeg\",\"width\":2560,\"height\":1920,\"caption\":\"Johanna Ullrich\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"home\",\"item\":\"https:\/\/it-u.at\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Meet IT:U\u2019s Ethical Hackers\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/it-u.at\/en\/#website\",\"url\":\"https:\/\/it-u.at\/en\/\",\"name\":\"it:u\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/it-u.at\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/it-u.at\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/it-u.at\/en\/#organization\",\"name\":\"it:u - interdisciplinary transformation university austria\",\"url\":\"https:\/\/it-u.at\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/it-u.at\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/it-u.at\/wp-content\/uploads\/2024\/09\/06\/itu-org-logo.jpg\",\"contentUrl\":\"https:\/\/it-u.at\/wp-content\/uploads\/2024\/09\/06\/itu-org-logo.jpg\",\"width\":696,\"height\":696,\"caption\":\"it:u - interdisciplinary transformation university austria\"},\"image\":{\"@id\":\"https:\/\/it-u.at\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/it-u.at\/en\/#\/schema\/person\/2769a3ae6d3967e0a508ef1b629cfc28\",\"name\":\"Dubravka Voloder\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Meet IT:U\u2019s Ethical Hackers\u00a0 | IT:U","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/","og_locale":"en_US","og_type":"article","og_title":"Meet IT:U\u2019s Ethical Hackers\u00a0 | IT:U","og_description":"How IT:U\u2019s ethical hackers work on preventing cyber security attacks that could affect us all. &nbsp; Most people would probably want to protect themselves from hackers. But what about welcoming them, albeit the ethical sort, for the public good? That\u2019s what Professor Johanna Ullrich and her team of \u2018ethical hackers\u2019 at IT:U are trying to [&hellip;]","og_url":"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/","og_site_name":"IT:U","article_published_time":"2026-03-17T14:58:49+00:00","article_modified_time":"2026-03-24T13:05:49+00:00","og_image":[{"width":2560,"height":1920,"url":"https:\/\/it-u.at\/wp-content\/uploads\/2026\/03\/19\/img_1293-scaled.jpeg","type":"image\/jpeg"}],"author":"Dubravka Voloder","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dubravka Voloder","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/#article","isPartOf":{"@id":"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/"},"author":{"name":"Dubravka Voloder","@id":"https:\/\/it-u.at\/en\/#\/schema\/person\/2769a3ae6d3967e0a508ef1b629cfc28"},"headline":"Meet IT:U\u2019s Ethical Hackers\u00a0","datePublished":"2026-03-17T14:58:49+00:00","dateModified":"2026-03-24T13:05:49+00:00","mainEntityOfPage":{"@id":"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/"},"wordCount":501,"publisher":{"@id":"https:\/\/it-u.at\/en\/#organization"},"image":{"@id":"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/it-u.at\/wp-content\/uploads\/2026\/03\/19\/img_1293-scaled.jpeg","articleSection":[":research news"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/","url":"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/","name":"Meet IT:U\u2019s Ethical Hackers\u00a0 | IT:U","isPartOf":{"@id":"https:\/\/it-u.at\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/#primaryimage"},"image":{"@id":"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/it-u.at\/wp-content\/uploads\/2026\/03\/19\/img_1293-scaled.jpeg","datePublished":"2026-03-17T14:58:49+00:00","dateModified":"2026-03-24T13:05:49+00:00","breadcrumb":{"@id":"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/#primaryimage","url":"https:\/\/it-u.at\/wp-content\/uploads\/2026\/03\/19\/img_1293-scaled.jpeg","contentUrl":"https:\/\/it-u.at\/wp-content\/uploads\/2026\/03\/19\/img_1293-scaled.jpeg","width":2560,"height":1920,"caption":"Johanna Ullrich"},{"@type":"BreadcrumbList","@id":"https:\/\/it-u.at\/en\/news\/meet-it-us-ethical-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"home","item":"https:\/\/it-u.at\/en\/"},{"@type":"ListItem","position":2,"name":"Meet IT:U\u2019s Ethical Hackers\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/it-u.at\/en\/#website","url":"https:\/\/it-u.at\/en\/","name":"it:u","description":"","publisher":{"@id":"https:\/\/it-u.at\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/it-u.at\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/it-u.at\/en\/#organization","name":"it:u - interdisciplinary transformation university austria","url":"https:\/\/it-u.at\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/it-u.at\/en\/#\/schema\/logo\/image\/","url":"https:\/\/it-u.at\/wp-content\/uploads\/2024\/09\/06\/itu-org-logo.jpg","contentUrl":"https:\/\/it-u.at\/wp-content\/uploads\/2024\/09\/06\/itu-org-logo.jpg","width":696,"height":696,"caption":"it:u - interdisciplinary transformation university austria"},"image":{"@id":"https:\/\/it-u.at\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/it-u.at\/en\/#\/schema\/person\/2769a3ae6d3967e0a508ef1b629cfc28","name":"Dubravka Voloder"}]}},"_links":{"self":[{"href":"https:\/\/it-u.at\/en\/wp-json\/wp\/v2\/posts\/17668"}],"collection":[{"href":"https:\/\/it-u.at\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it-u.at\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it-u.at\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/it-u.at\/en\/wp-json\/wp\/v2\/comments?post=17668"}],"version-history":[{"count":16,"href":"https:\/\/it-u.at\/en\/wp-json\/wp\/v2\/posts\/17668\/revisions"}],"predecessor-version":[{"id":17796,"href":"https:\/\/it-u.at\/en\/wp-json\/wp\/v2\/posts\/17668\/revisions\/17796"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/it-u.at\/en\/wp-json\/wp\/v2\/media\/17701"}],"wp:attachment":[{"href":"https:\/\/it-u.at\/en\/wp-json\/wp\/v2\/media?parent=17668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it-u.at\/en\/wp-json\/wp\/v2\/categories?post=17668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it-u.at\/en\/wp-json\/wp\/v2\/tags?post=17668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}