Down the Rabbit Hole: Botnet Analysis for Non-Reverse Engineers

By Talos Group This post is authored by Earl Carter & Holger Unterbrink . Overview Talos is often tasked with mapping the backend network for a specific piece of malware. One approach is to first reverse engineer the sample and determine exactly how it operates. But what if there is no time or resources to take the sample apart? This post is going to show how to examine a botnet from the Fareit family, starting with just an IP address. Then, using sandbox communities like Cisco ThreatGRID []

Source:: Cisco Security Notice

Down the Rabbit Hole: Botnet Analysis for Non-Reverse Engineers

By Talos Group This post is authored by Earl Carter & Holger Unterbrink . Overview Talos is often tasked with mapping the backend network for a specific piece of malware. One approach is to first reverse engineer the sample and determine exactly how it operates. But what if there is no time or resources to take the sample apart? This post is going to show how to examine a botnet from the Fareit family, starting with just an IP address. Then, using sandbox communities like Cisco ThreatGRID []

Source:: Cisco Security Notice

Oberberg-Online Lauf-Team unterwegs

Former Governor, U.S. Commerce Secretary, and U.S. Ambassador, Gary Locke, Joins Fortinet Board of Directors

Former Governor, U.S. Commerce Secretary, and U.S. Ambassador, Gary Locke, Joins Fortinet Board of Directors

Source:: Fortinet

Former Governor, U.S. Commerce Secretary, and U.S. Ambassador, Gary Locke, Joins Fortinet Board of Directors

Former Governor, U.S. Commerce Secretary, and U.S. Ambassador, Gary Locke, Joins Fortinet Board of Directors

Source:: Fortinet

Point of Persistence

By Tom Hogue Several recent cyber attacks have served as great reminders that we need to continue to re-assess how we are protecting our networks and ensure that we make no assumptions of any device being secure in the network. One example of this is “SYNFul Knock,” a type of persistent malware that allows an attacker to gain control of an affected Cisco device and compromise its integrity with a modified Cisco IOS software image. The attack did not leverage any product vulnerabilities, and []

Source:: Cisco Security Notice

Point of Persistence

By Tom Hogue Several recent cyber attacks have served as great reminders that we need to continue to re-assess how we are protecting our networks and ensure that we make no assumptions of any device being secure in the network. One example of this is “SYNFul Knock,” a type of persistent malware that allows an attacker to gain control of an affected Cisco device and compromise its integrity with a modified Cisco IOS software image. The attack did not leverage any product vulnerabilities, and []

Source:: Cisco Security Notice

Fortinet Meru WLAN für kritische Umgebungen bestens geeignet

Fortinet Meru WLAN für kritische Umgebungen bestens geeignet

 

Egal, ob im Bereich Gesundheitswesen, Schulen und Hochschulen, komplexen Produktionsumgebungen, oder Gastgewerbe / Tourismus – Mit einer Fortinet Meru WLAN-Lösung von Oberberg-Online  gehen Sie auf Nummer sicher.

Durch die patentierte Single-Channel-Technik sind Ausleuchtung, Erweiterung und der Betrieb kritischer Anwendungen, wie z.B. Sprachübertragung, sehr gut umsetzbar. Für alle Interessenten, die nicht persönlich teilnehmen konnten, hier noch einmal der Vortrag von Jan Willecke-Meyer (Fortinet Meru) als PDF und Video:

Sehen Sie hier die Fortinet Meru WLAN Präsentation von unserer Veranstaltung:

Fortinet Meru WLAN als PDF

Oder hier den Vortrag im Video:

 

Gerne planen und installieren wir auch Ihre Fortinet Meru WLAN-Lösung. Termine zum Informationsgespräch unter 02261 9155050 vereinbaren, oder unter vertrieb@oberberg.net