Einträge von Technik Support

PoetRAT Uses Covid-19 Lures To Attack Azerbajian

By Talos Group Cisco Talos has discovered a new malware campaign based on a previously unknown family we’re calling “PoetRAT.” At this time, we do not believe this attack is associated with an already known threat actor. Our research shows the malware was distributed using URLs that mimic some Azerbaijan government domains, thus we believe […]

How to Monitor VPN Split Tunneling and Remote Endpoints with Existing Infrastructure

By Scott Pope Using AnyConnect for VPN? Got Splunk? If so, you have what you need to secure, monitor and gain detailed endpoint visibility to: Implement VPN split tunneling to alleviate VPN capacity constraints without sacrificing security Monitor and further optimize traffic you put over your existing split tunnel deployment Analyze security behavior of remote […]

The Firewall: The foundation for a robust Security Platform

By Brian Remmel After many years of a strong preference for ‘best of breed‘ security tools, the tides are turning. There’s growing fatigue of the operational downsides – managing countless alerts and manually correlating threats, for example – inherent in this approach. Security products today need to include out-of-box integrations, interoperate with third–party solutions, share […]

5 Questions to Ask Your Security Platform Vendor

By Sana Yousuf CISO are always on the hunt for innovative solutions to solve their most pressing problems. They have been forced to choose their own adventure from an industry that’s rife with incompatibility, running their operations across dozens of tools and a plethora of consoles that don’t talk to each other. And this, combined […]

Threat Roundup for April 3 to April 10

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Apr 3 and Apr 10. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]

Promising Results for Post-Quantum Certificates in TLS 1.3

By Panos Kampanakis The Challenge Quantum Computers could threaten the security of TLS key exchange and authentication. To assess the performance of post-quantum certificates TLS 1.3, we evaluated NIST Round 2 signature algorithms and concluded that two of them offer acceptable speeds. We also analyzed other implications of post-quantum certs in TLS. More details in […]

How to Strengthen Your Security in 2020

By Angela Frechette Cannon Which technologies will help you the most? As part of the recent RSA Conference, we all got to see – either in-person or virtually – the latest and greatest technology coming out of the security industry. While events like this can certainly be helpful in guiding future investments, they can also […]