Einträge von Technik Support

Cybersecurity: What Needs to Change Now

By John Stewart October is National Cyber Security Awareness Month in the United States. This year’s campaign emphasizes cybersecurity as part of a deliberate strategy and a shared responsibility, not just a checkbox item. At Cisco, we believe two key things must change in the security industry. First, we need to acknowledge that security is […]

Cybersecurity: What Needs to Change Now

By John Stewart October is National Cyber Security Awareness Month in the United States. This year’s campaign emphasizes cybersecurity as part of a deliberate strategy and a shared responsibility, not just a checkbox item. At Cisco, we believe two key things must change in the security industry. First, we need to acknowledge that security is […]

Down the Rabbit Hole: Botnet Analysis for Non-Reverse Engineers

By Talos Group This post is authored by Earl Carter & Holger Unterbrink . Overview Talos is often tasked with mapping the backend network for a specific piece of malware. One approach is to first reverse engineer the sample and determine exactly how it operates. But what if there is no time or resources to […]

Down the Rabbit Hole: Botnet Analysis for Non-Reverse Engineers

By Talos Group This post is authored by Earl Carter & Holger Unterbrink . Overview Talos is often tasked with mapping the backend network for a specific piece of malware. One approach is to first reverse engineer the sample and determine exactly how it operates. But what if there is no time or resources to […]

Point of Persistence

By Tom Hogue Several recent cyber attacks have served as great reminders that we need to continue to re-assess how we are protecting our networks and ensure that we make no assumptions of any device being secure in the network. One example of this is “SYNFul Knock,” a type of persistent malware that allows an […]

Point of Persistence

By Tom Hogue Several recent cyber attacks have served as great reminders that we need to continue to re-assess how we are protecting our networks and ensure that we make no assumptions of any device being secure in the network. One example of this is “SYNFul Knock,” a type of persistent malware that allows an […]