IEC 104 Protocol Detection Rules

By Talos Group IEC 60870-5-104 Protocol Detection Rules Cisco Talos has released 33 Snort rules which are used to analyze/inspect IEC 60870-5-104 network traffic. These rules will help Industrial Control Systems/Supervisory Control and Data Acquisition (ICS/SCADA) asset owners to allow the identification of both normal and abnormal traffic in their environments. In order for these rules to be […]

Source:: Cisco Security Notice

IEC 104 Protocol Detection Rules

By Talos Group IEC 60870-5-104 Protocol Detection Rules Cisco Talos has released 33 Snort rules which are used to analyze/inspect IEC 60870-5-104 network traffic. These rules will help Industrial Control Systems/Supervisory Control and Data Acquisition (ICS/SCADA) asset owners to allow the identification of both normal and abnormal traffic in their environments. In order for these rules to be […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Tarantool Denial of Service Vulnerabilities

By Talos Group Vulnerabilities discovered by Talos Talos is disclosing two denial of service vulnerabilities (CVE-2016-9036 & CVE-2016-9037) in Tarantool. Tarantool is an open-source lua-based application server. While primarily functioning as an application server, it is also capable of providing database-like features and providing an in-memory database which can be queried using a protocol based around the MsgPack […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Tarantool Denial of Service Vulnerabilities

By Talos Group Vulnerabilities discovered by Talos Talos is disclosing two denial of service vulnerabilities (CVE-2016-9036 & CVE-2016-9037) in Tarantool. Tarantool is an open-source lua-based application server. While primarily functioning as an application server, it is also capable of providing database-like features and providing an in-memory database which can be queried using a protocol based around the MsgPack […]

Source:: Cisco Security Notice

Ransomware – Anatomie eines Angriffs

Ransomware – Anatomie eines Angriffs.

Man muss den englischen Begriff kaum noch übersetzen, denn seit Locky, Petya, Goldeneye und Co. hat auch der normale Anwender das Thema in Tagesschau und heute journal serviert bekommen.

Einige fragen sich sicherlich, ob sie selbst Opfer werden könnten, andere denken vielleicht :“ Wie kann man so blöd sein und auf so etwas hereinfallen?„.

Der kurze Film unseres Partners Cisco zeigt sehr anschaulich – wenn auch in englischer Sprache – wie gut gemacht solche Angriffe erfolgen und wie schwierig es ist, diese auf den ersten Blick zu erkennen.

Die Sicherheit für Ihr Netzwerk und Ihre Arbeitsplatz-Systeme können wir gemeinsam deutlich erhöhen:

DSC_2022 klein

Bastian Breidenbach

breidenbach@oberberg.net

DSC_2012 klein

Dennis Goslar

goslar@oberberg.net

Dirk Zurawski
02261 9155051
zurawski@oberberg.net

In the Eye of the Hailstorm

By Talos Group This blog post was authored by Jakob Dohrmann, David Rodriguez, and Jaeson Schultz. The Cisco Talos and Umbrella research teams are deploying a distributed hailstorm detection system which brings together machine learning, stream processing of DNS requests and the curated Talos email corpus. Talos has discussed snowshoe spam before. Traditional snowshoe spam campaigns are sent […]

Source:: Cisco Security Notice

In the Eye of the Hailstorm

By Talos Group This blog post was authored by Jakob Dohrmann, David Rodriguez, and Jaeson Schultz. The Cisco Talos and Umbrella research teams are deploying a distributed hailstorm detection system which brings together machine learning, stream processing of DNS requests and the curated Talos email corpus. Talos has discussed snowshoe spam before. Traditional snowshoe spam campaigns are sent […]

Source:: Cisco Security Notice

To be Effective, Security Needs to Be a Force Multiplier

By Jason Lamar Effective security is simple, open, and automated. We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]

Source:: Cisco Security Notice

To be Effective, Security Needs to Be a Force Multiplier

By Jason Lamar Effective security is simple, open, and automated. We’ve already talked about simple and open. Now let’s talk about automated. Security admins can relate to this scenario. You just learned of an infected system in your environment of thousands of devices. How many others are affected? That’s hard to figure out even in elite operations. What […]

Source:: Cisco Security Notice