By Omar Santos Interest in IT security has never been higher. So when a new type of attack comes along, it attracts the attention of our customers and others in the industry. Earlier this week Cisco and Mandiant/Fireye released information about the so-called SYNful Knock malware found on Cisco networking devices. You can read my earlier blog on this subject here: SYNful Knock: Detecting and Mitigating Cisco IOS Software Attacks . This attack isn’t caused by a problem or vulnerability with a Cisco product. It results from an attacker stealing administrative credentials []

Source:: Cisco Security Notice

By Omar Santos Interest in IT security has never been higher. So when a new type of attack comes along, it attracts the attention of our customers and others in the industry. Earlier this week Cisco and Mandiant/Fireye released information about the so-called SYNful Knock malware found on Cisco networking devices. You can read my earlier blog on this subject here: SYNful Knock: Detecting and Mitigating Cisco IOS Software Attacks . This attack isn’t caused by a problem or vulnerability with a Cisco product. It results from an attacker stealing administrative credentials []

Source:: Cisco Security Notice

Fortinet and Splunk Technical Alliance Delivers High Performance Security Intelligence, Visibility and Protection to Customers Globally

Source:: Fortinet

Fortinet and Splunk Technical Alliance Delivers High Performance Security Intelligence, Visibility and Protection to Customers Globally

Source:: Fortinet

Sicherheit auch für kleine Firmennetzwerke – Oberberg-Online bietet Lösungen für alle Unternehmensgrößen an.

Bedroht werden heute nicht mehr nur große Unternehmen. Die Risiken für das Netzwerk von kleinen Firmen ist in den letzten Jahren stark angestiegen. Jeder Unternehmer sollte sich Gedanken darüber machen, wie sein Netzwerk und die Daten seiner Kunden geschützt werden können.

Sprechen Sie mit uns über Risikominimierung und die Vorteile einer integrierten Lösung: 02261 9155050 oder schreiben Sie uns Ihren Terminwunsch an vertrieb@oberberg.net

 

 

 

 

By Dan Hubbard This post is officially my first after coming over as part of the Cisco acquisition of OpenDNS . Since 2012, I’ve served as the CTO and am proud to be part of an incredible research team, OpenDNS Labs. Like the Talos Research Group we are focussed on detecting and preventing threats that help protect our customers globally. We are uniquely positioned to do this through statistical models and classification techniques that are fueled by our satellite view of the internet’s infrastructure with more than 80 Billion active DNS queries per day. Today I’d like []

Source:: Cisco Security Notice

By Dan Hubbard This post is officially my first after coming over as part of the Cisco acquisition of OpenDNS . Since 2012, I’ve served as the CTO and am proud to be part of an incredible research team, OpenDNS Labs. Like the Talos Research Group we are focussed on detecting and preventing threats that help protect our customers globally. We are uniquely positioned to do this through statistical models and classification techniques that are fueled by our satellite view of the internet’s infrastructure with more than 80 Billion active DNS queries per day. Today I’d like []

Source:: Cisco Security Notice

By Talos Group This post was authored by Earl Carter , Alex Chiu , Joel Esler , Geoff Serrao, and Brandon Stultz. Defining what is malware relies on determining when undesirable behavior crosses the line from benign to clearly unwanted. The lack of a single standard regarding what is and what is not acceptable behavior has established a murky gray area and vendors have taken advantage of this to push the limits of acceptable behavior. The “Infinity Popup Toolkit” is a prime example of software that falls into this []

Source:: Cisco Security Notice

By Talos Group This post was authored by Earl Carter , Alex Chiu , Joel Esler , Geoff Serrao, and Brandon Stultz. Defining what is malware relies on determining when undesirable behavior crosses the line from benign to clearly unwanted. The lack of a single standard regarding what is and what is not acceptable behavior has established a murky gray area and vendors have taken advantage of this to push the limits of acceptable behavior. The “Infinity Popup Toolkit” is a prime example of software that falls into this []

Source:: Cisco Security Notice

Fortinet’s New High-Performance Web Application Firewalls and Security Services Further Protect Customer Data from Attack and Data Loss

Source:: Fortinet