Efrem Lemonis verstärkt unser Technik-Team
Kaum bei uns angekommen und schon den ersten Zertifizierungslehrgang erfolgreich bestanden. So kann man starten, oder?Glückwunsch zum Bestehen des innovaphone Technician Connect. Zur Freude der Kollegen spielt Efrem an der Konsole im Team X-BOX. In der Freizeit testet er gerne gemeinsam mit seiner Freundin die unterschiedlichsten Restaurants und hält sich auch privat in Sachen PC-Systeme […]
Threat Roundup for September 6 to September 13
By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Sep. 6. to Sep 13. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]
New Threat Grid App for IBM QRadar SIEM
By Jessica Bair Download the app for faster, more effective threat detection and response Two years ago, Cisco and IBM Security announced a strategic alliance to address the growing threat of cybercrime. This collaboration builds on each organization’s strengths and complementary offerings to provide integrated solutions, managed services and shared threat intelligence to drive more […]
Watchbog and the Importance of Patching
By Talos Group By Luke DuCharme and Paul Lee. What Happened? Cisco Incident Response (CSIRS) recently responded to an incident involving the Watchbog cryptomining botnet. The attackers were able to exploit CVE-2018-1000861 to gain a foothold and install the Watchbog malware on the affected systems. This Linux-based malware relied heavily on Pastebin for command and […]
Ingredients Needed to Manage Network Tribbles
By Amanda Rogerson Cybersecurity – the final frontier, these are the trials and tribulations that network admins face on an ongoing basis. Sometimes it feels like network admins are Starfleet captains navigating unknown galaxies as the infrastructure of organizations become more complex. Using a complicated mix of cloud apps, on-prem systems, BYOD, IoT, and more, […]
The Value of Threat Hunting
By Ben Nahorney It can happen to the best of us. You can have robust security software deployed in your environment, and yet a threat slips through. Often it happens at a weak point that you hadn’t considered critical or just overlooked entirely. It can be a humbling experience and something that many security professionals, […]
Threat Roundup for August 30 to September 6
By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between Aug. 30 and Sep. 6. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how […]