Hello World!

By Dan Hubbard This post is officially my first after coming over as part of the Cisco acquisition of OpenDNS . Since 2012, I’ve served as the CTO and am proud to be part of an incredible research team, OpenDNS Labs. Like the Talos Research Group we are focussed on detecting and preventing threats that help protect our customers globally. We are uniquely positioned to do this through statistical models and classification techniques that are fueled by our satellite view of the internet’s infrastructure with more than 80 Billion active DNS queries per day. Today I’d like []

Source:: Cisco Security Notice

When Does Software Start Becoming Malware?

By Talos Group This post was authored by Earl Carter , Alex Chiu , Joel Esler , Geoff Serrao, and Brandon Stultz. Defining what is malware relies on determining when undesirable behavior crosses the line from benign to clearly unwanted. The lack of a single standard regarding what is and what is not acceptable behavior has established a murky gray area and vendors have taken advantage of this to push the limits of acceptable behavior. The “Infinity Popup Toolkit” is a prime example of software that falls into this []

Source:: Cisco Security Notice

When Does Software Start Becoming Malware?

By Talos Group This post was authored by Earl Carter , Alex Chiu , Joel Esler , Geoff Serrao, and Brandon Stultz. Defining what is malware relies on determining when undesirable behavior crosses the line from benign to clearly unwanted. The lack of a single standard regarding what is and what is not acceptable behavior has established a murky gray area and vendors have taken advantage of this to push the limits of acceptable behavior. The “Infinity Popup Toolkit” is a prime example of software that falls into this []

Source:: Cisco Security Notice

Fortinet’s New High-Performance Web Application Firewalls and Security Services Further Protect Customer Data from Attack and Data Loss

Fortinet’s New High-Performance Web Application Firewalls and Security Services Further Protect Customer Data from Attack and Data Loss

Source:: Fortinet

Fortinet’s New High-Performance Web Application Firewalls and Security Services Further Protect Customer Data from Attack and Data Loss

Fortinet’s New High-Performance Web Application Firewalls and Security Services Further Protect Customer Data from Attack and Data Loss

Source:: Fortinet

SYNful Knock: Detecting and Mitigating Cisco IOS Software Attacks

By Omar Santos Historically, threat actors have targeted network devices to create disruption through a denial of service (DoS) situation. While this remains the most common type of attack on network devices, we continue to see advances that focus on further compromising the victim’s infrastructure. Recently, the Cisco Product Security Incident Response Team (PSIRT) has alerted customers around the evolution of attacks against Cisco IOS Software platforms . Today, Mandiant/FireEye published an article describing an example of this type of attack. This involved a router “implant” that they dubbed SYNful Knock, reported to have been found in []

Source:: Cisco Security Notice

SYNful Knock: Detecting and Mitigating Cisco IOS Software Attacks

By Omar Santos Historically, threat actors have targeted network devices to create disruption through a denial of service (DoS) situation. While this remains the most common type of attack on network devices, we continue to see advances that focus on further compromising the victim’s infrastructure. Recently, the Cisco Product Security Incident Response Team (PSIRT) has alerted customers around the evolution of attacks against Cisco IOS Software platforms . Today, Mandiant/FireEye published an article describing an example of this type of attack. This involved a router “implant” that they dubbed SYNful Knock, reported to have been found in []

Source:: Cisco Security Notice

Trabant Freunde Kalsbach e.V. bei Oberberg-Online

Trabant Freunde Kalsbach e.V. bei Oberberg-Online – „Holt Eure Webseiten nach Hause

DSCI02712 mal

Im Mai 2008 von 15 Gründungsmitgliedern ins Leben gerufen, hat der Verein heute 62 Mitglieder mit 28 Fahrzeugen. Neben der  Erhaltung der „Trabis“ werden Freundschaften zu anderen Vereinen in Deutschland und den Niederlanden gepflegt. Gemeinsame Ausfahrten zu Oldtimertreffen und Teilemärkten sind fester Bestandteil des Vereinskalenders. In diesem Jahr waren die Trabantfreunde auch bereits im ZDF zu sehen.

Der oberbergische Trabi-Club folgt der Initiative von Oberberg-Online, bergische Webseiten auch „zu Hause“ im Bergischen zu hosten.

Der Gummersbacher Provider betreibt seit 1996 in der Kreisstadt eigene Infrastruktur und greift nicht – wie viele Andere – auf angemietete Maschinen irgendwo in der Welt zurück. Das hat den Vorteil, dass neben der persönlichen Betreuung durch Spezialisten im Hause auch gewährleistet ist, dass Daten des Kunden nicht gehandelt und verkauft werden. Natürlich ist das nicht umsonst zu haben, aber mit der Einführung von Plesk-basierenden Hostingpaketen gibt es auch kleine Pakete ab mtl. EURO 4,90.

Also: „Auf, auf, Ihr Bergischen, Holt Eure Webseiten nach Hause.“

Termine und Beratung unter 02261 9155050 oder vertrieb@oberberg.net

IMG_8263IMG_9694_kleinIMG_9693-klein

 

Anomaly vs Vulnerability Detection Using Cisco IPS

By Nick Smith The Cisco IPS network based intrusion prevention system (NIPS) uses signatures to detect network-based attacks. Signatures can be created in a variety of engines based on the type of network traffic being inspected. Cisco signatures have very flexible configurations. In this blog post, I will discuss the trade-offs between two basic approaches for signature configuration: anomaly detection and vulnerability detection. With Cisco IPS, anomaly detection is a broad approach of detecting malicious network activity. Signatures written to detect broad categories []

Source:: Cisco Security Notice

Anomaly vs Vulnerability Detection Using Cisco IPS

By Nick Smith The Cisco IPS network based intrusion prevention system (NIPS) uses signatures to detect network-based attacks. Signatures can be created in a variety of engines based on the type of network traffic being inspected. Cisco signatures have very flexible configurations. In this blog post, I will discuss the trade-offs between two basic approaches for signature configuration: anomaly detection and vulnerability detection. With Cisco IPS, anomaly detection is a broad approach of detecting malicious network activity. Signatures written to detect broad categories []

Source:: Cisco Security Notice