Where in the World Is Your Email Security?

By Scott Bower Email continues to be both the number one way business people across the globe communicate, as well as the number one threat vector that can endanger the very thing it is trying to enable, getting business done. However, our global economy means now, more than ever, senders and receivers of email can […]

Where in the World Is Your Email Security?

By Scott Bower Email continues to be both the number one way business people across the globe communicate, as well as the number one threat vector that can endanger the very thing it is trying to enable, getting business done. However, our global economy means now, more than ever, senders and receivers of email can […]

FUJITSU Aktionsmodelle August 2017

Die Sommerferien in NRW haben Halbzeit. Für die Urlaubsheimkehrer haben wir auch im August wieder spannende Aktionsmodelle unseres Partners FUJITSU zusammengestellt. Die Cash-Back-Aktion für ausgewählte mobile Systeme läuft noch bis Ende August. Sichern Sie sich jetzt 100,00 EURO je Gerät (für Unternehmen bis zu 50 Mobiles aktionsberechtigt!). Die gesamten Aktionsmodelle aus den Bereichen mobiles Arbeiten […]

When combining exploits for added effect goes wrong

By Talos Group Since public disclosure in April 2017, CVE-2017-0199 has been frequently used within malicious Office documents. The vulnerability allows attackers to include Ole2Link objects within RTF documents to launch remote code when HTA applications are opened and parsed by Microsoft Word. In this recent campaign, attackers combined CVE-2017-0199 exploitation with an earlier exploit, […]

When combining exploits for added effect goes wrong

By Talos Group Since public disclosure in April 2017, CVE-2017-0199 has been frequently used within malicious Office documents. The vulnerability allows attackers to include Ole2Link objects within RTF documents to launch remote code when HTA applications are opened and parsed by Microsoft Word. In this recent campaign, attackers combined CVE-2017-0199 exploitation with an earlier exploit, […]

4. Oberberg-Online Business-Frühstück

Die Anmeldung für unser 4. Business-Frühstück steht nun zur Verfügung. Termin ist der 28.09.2017 um 09:00 Uhr in unserem Hause. Wem vmWare zu teuer ist, sollte sich den Slot zum Thema Microsoft HyperV anhören…und wer auf Security Made in Germany steht, ist mit unserem Partner G DATA aus Bochum bestens versorgt. Wir freuen uns auf […]

WinDBG and JavaScript Analysis

By Talos Group This blog was authored by Paul Rascagneres. Introduction JavaScript is frequently used by malware authors to execute malicious code on Windows systems because it is powerful, natively available and rarely disabled. Our previous article on .NET analysis generated much interest relating to how to use WinDBG to analyse .js files. In this […]