Trustworthy Systems: A Peek Behind the Curtain
By Graham Holmes In a recent post, “ Evolution of attacks on Cisco IOS devices ”, we discussed how threats against network devices have evolved. There was no evidence that a remote attack vector or vulnerability in Cisco IOS was related to these attacks. This reinforces the value of creating more hardened and resilient systems. […]
Trustworthy Systems: A Peek Behind the Curtain
By Graham Holmes In a recent post, “ Evolution of attacks on Cisco IOS devices ”, we discussed how threats against network devices have evolved. There was no evidence that a remote attack vector or vulnerability in Cisco IOS was related to these attacks. This reinforces the value of creating more hardened and resilient systems. […]
Domains of the Living Dead
By Talos Group According to the Centers for Disease Control and Prevention (CDC), “If you’re ready for a zombie apocalypse, then you’re ready for any emergency.” While events haven’t yet risen to the level of “zombie apocalypse”, computer attackers are continuing to use their voodoo to zombify Internet domains, and repurpose them for their own […]
Domains of the Living Dead
By Talos Group According to the Centers for Disease Control and Prevention (CDC), “If you’re ready for a zombie apocalypse, then you’re ready for any emergency.” While events haven’t yet risen to the level of “zombie apocalypse”, computer attackers are continuing to use their voodoo to zombify Internet domains, and repurpose them for their own […]
Innovaphone myPBX mobile (iOS, Android, …)
Innovaphone myPBX mobile (iOS, Android, …) myPBX mobile, das ist die Lösung für alle Smartphones und Tablets um perfekt in die innovaphone PBX integriert zu werden. Ihr mobiles Endgerät wird zum innovaphone Device. myPBX, der Unified Communications Client der innovaphone PBX, ist als Webapplikation auf allen Browsern und Betriebssystemen zu Hause. Dies gilt ebenfalls für […]
A Sheep in Wolf’s Clothing
By Martin Nystrom Those of us who work in security operations are well accustomed to blind spots. Depending on the size of the network, our security technologies can trigger thousands of security alerts daily. We know from experience that the vast majority of these alerts are false-positives – innocuous activity that behaves a bit funny. […]
A Sheep in Wolf’s Clothing
By Martin Nystrom Those of us who work in security operations are well accustomed to blind spots. Depending on the size of the network, our security technologies can trigger thousands of security alerts daily. We know from experience that the vast majority of these alerts are false-positives – innocuous activity that behaves a bit funny. […]