Down the Rabbit Hole: Botnet Analysis for Non-Reverse Engineers

By Talos Group This post is authored by Earl Carter & Holger Unterbrink . Overview Talos is often tasked with mapping the backend network for a specific piece of malware. One approach is to first reverse engineer the sample and determine exactly how it operates. But what if there is no time or resources to take the sample apart? This post is going to show how to examine a botnet from the Fareit family, starting with just an IP address. Then, using sandbox communities like Cisco ThreatGRID []

Source:: Cisco Security Notice

Oberberg-Online Lauf-Team unterwegs

Former Governor, U.S. Commerce Secretary, and U.S. Ambassador, Gary Locke, Joins Fortinet Board of Directors

Former Governor, U.S. Commerce Secretary, and U.S. Ambassador, Gary Locke, Joins Fortinet Board of Directors

Source:: Fortinet

Point of Persistence

By Tom Hogue Several recent cyber attacks have served as great reminders that we need to continue to re-assess how we are protecting our networks and ensure that we make no assumptions of any device being secure in the network. One example of this is “SYNFul Knock,” a type of persistent malware that allows an attacker to gain control of an affected Cisco device and compromise its integrity with a modified Cisco IOS software image. The attack did not leverage any product vulnerabilities, and []

Source:: Cisco Security Notice

Fortinet Meru WLAN für kritische Umgebungen bestens geeignet

Fortinet Meru WLAN für kritische Umgebungen bestens geeignet

 

Egal, ob im Bereich Gesundheitswesen, Schulen und Hochschulen, komplexen Produktionsumgebungen, oder Gastgewerbe / Tourismus – Mit einer Fortinet Meru WLAN-Lösung von Oberberg-Online  gehen Sie auf Nummer sicher.

Durch die patentierte Single-Channel-Technik sind Ausleuchtung, Erweiterung und der Betrieb kritischer Anwendungen, wie z.B. Sprachübertragung, sehr gut umsetzbar. Für alle Interessenten, die nicht persönlich teilnehmen konnten, hier noch einmal der Vortrag von Jan Willecke-Meyer (Fortinet Meru) als PDF und Video:

Sehen Sie hier die Fortinet Meru WLAN Präsentation von unserer Veranstaltung:

Fortinet Meru WLAN als PDF

Oder hier den Vortrag im Video:

 

Gerne planen und installieren wir auch Ihre Fortinet Meru WLAN-Lösung. Termine zum Informationsgespräch unter 02261 9155050 vereinbaren, oder unter vertrieb@oberberg.net

 

 

It’s That Time Again—Announcing the Cisco IOS & XE Software Security Advisory Bundled Publication

By Erin Float Today, we released the last Cisco IOS & XE Software Security Advisory Bundled Publication of 2015. As a reminder, Cisco discloses IOS vulnerabilities on a predictable schedule (the fourth Wednesday of March and September each calendar year). Last cycle, we began including Cisco Security Advisories addressing vulnerabilities in Cisco IOS XE Software in this publication. This change was a direct result of your feedback, and we hope the timeline and additional “bundling” continues to allow organizations to plan and ensure resources are available to analyze, test, and remediate vulnerabilities in their []

Source:: Cisco Security Notice

SYNful Knock Scanner

By Talos Group This post was authored by William McVey . Talos is constantly researching the ways in which threat actors are evolving to exploit systems. Recently, a piece of persistent malware coined as “ SYNful Knock” was discovered on Cisco routers . While this malware attack is not a vulnerability, as it had to be installed by someone using valid credentials or who had physical access to the device, Cisco has published an Event Response Page for customers to provide the information needed to detect and remediate these types of attacks. We are also working with partners []

Source:: Cisco Security Notice

Cognitive Research: Fake Blogs Generating Real Money

By Michal Sofka Summary In the past several months Cisco Cognitive Threat Analytics (CTA) researchers have observed a number of blog sites using either fake content or content stolen from other sites to drive traffic to click on ad-loaded web sites. We have observed traffic volume up to 10,000 requests per hour, targeting hundreds of sites. The estimated lifetime of this campaign is at least 9 months. With a single click worth anywhere from $0.01 and $1, these scams can yield substantial returns []

Source:: Cisco Security Notice

Welcome Michelle Dennedy, Cisco’s Chief Privacy Officer

By John Stewart “It’s our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track.” —The Privacy Engineer’s Manifesto, 2014 Privacy in an always and increasingly connected world is a complex topic. Does privacy mean the same thing it did 20—or even 10 years ago—before we all used smartphones and social media? How does data that we []

Source:: Cisco Security Notice