Vulnerability Spotlight: Kakadu SDK Vulnerabilities

By Talos Group Vulnerabilities discovered by Aleksandar Nikolic and Tyler Bohan of Cisco Talos. Today, Talos is disclosing multiple vulnerabilities that have been identified in the Kakadu JPEG 2000 SDK. The vulnerabilities manifest in a way that could be exploited if a user opens a specifically crafted JPEG 2000 file. Talos has coordinated with Kakadu to ensure relevant […]

Source:: Cisco Security Notice

Vulnerability Spotlight: Kakadu SDK Vulnerabilities

By Talos Group Vulnerabilities discovered by Aleksandar Nikolic and Tyler Bohan of Cisco Talos. Today, Talos is disclosing multiple vulnerabilities that have been identified in the Kakadu JPEG 2000 SDK. The vulnerabilities manifest in a way that could be exploited if a user opens a specifically crafted JPEG 2000 file. Talos has coordinated with Kakadu to ensure relevant […]

Source:: Cisco Security Notice

Taking the FIRST look at Crypt0l0cker

By Talos Group This post is authored by Matthew Molyett. Executive Summary In March, Talos reported on the details of Crypt0l0cker based on an extensive analysis I carried out on the sample binaries. Binaries — plural — because, as noted in the original blog, the Crypt0l0cker payload leveraged numerous executable files which shared the same codebase. Those executables had nearly identical […]

Source:: Cisco Security Notice

Taking the FIRST look at Crypt0l0cker

By Talos Group This post is authored by Matthew Molyett. Executive Summary In March, Talos reported on the details of Crypt0l0cker based on an extensive analysis I carried out on the sample binaries. Binaries — plural — because, as noted in the original blog, the Crypt0l0cker payload leveraged numerous executable files which shared the same codebase. Those executables had nearly identical […]

Source:: Cisco Security Notice

Replace your AV with Next Generation Endpoint Security

By Joe Malenfant If you’ve been to a security conference in the last year you’ve probably seen more than 20 different vendors all talking about endpoint security. Some might be talking about next generation anti-virus, endpoint detection and response, and even the much lauded machine learning. How do you cut through the clutter and noise to find what […]

Source:: Cisco Security Notice

Replace your AV with Next Generation Endpoint Security

By Joe Malenfant If you’ve been to a security conference in the last year you’ve probably seen more than 20 different vendors all talking about endpoint security. Some might be talking about next generation anti-virus, endpoint detection and response, and even the much lauded machine learning. How do you cut through the clutter and noise to find what […]

Source:: Cisco Security Notice

Die Auswahl der richtigen Firewall

Eine der größten Herausforderungen für Unternehmen ist die Auswahl der richtigen IT-Security-Komponenten. Der Markt ist hier quasi unüberschaubar und eine Vielzahl Anbieter buhlen um die Budgets.

Dabei hat jeder Anbieter die beste Lösung im Portfolio und deren Marketingabteilungen produzieren bunte Statistiken und Whitepaper, um den Kunden zu überzeugen. Orientierung in diesem Dickicht bieten unabhängige Tests, die Firewalls unter realen Bedingungen prüfen. So werden dann auch Leistungsdaten offengelegt, die z.B. einen Einbruch des Firewall-Durchsatzes bei kleinen Paketgrößen dokumentieren – was viele Hersteller geflissentlich in ihren Unterlagen nicht aufzeigen.

Einer der bekanntesten unabhängigen Tester sind die NSS-Labs. Hier wird regelmäßig den 10 führenden Next Generation Firewall Herstellern auf den Zahn gefühlt.

Im aktuellen Test schnitten sowohl die Fortigate 600D, als auch die Fortigate 3200D mit dem Ergebnis „NSS Labs recommended NGFW“ ab – bereits zum vierten mal. Getestet wurden neben der Erkennung und dem Blockieren von Exploits und Angriffen auch die Leistung bei der Prüfung von SSL-Traffic (sehr Ressourcen-intensiv) und dem Netzwerkdurchsatz bei allen Paketgrößen. Abgerundet durch ein hervorragendes Preis-Leistungs-Verhältnis (gemessen in USD pro geschütztem MBit/sek Bandbreite) sind die getesteten Fortigates eine NSS-Empfehlung – wie auch viele andere getestete Fortinet-Lösungen im gesamten IT-Security Umfeld.

Mehr zu den Fortinet-Lösungen und einer gestaffelten IT-Security für Ihr Unternehmen gibt es bei uns:

DSC_2012 klein

Dennis Goslar

goslar@oberberg.net

DSC_2022 klein

Bastian Breidenbach

breidenbach@oberberg.net

Dirk Zurawski
02261 9155051
zurawski@oberberg.net

The Real IoT Opportunity for Enterprises? A Chance to Address Security Risks Head On

By Craig Williams When business leaders think about the Internet of Things (IoT), they tend to focus on the potential opportunities for the enterprise and give far less attention to security risks. That’s a mistake. So, too, is believing that the IoT is only a concept on the distant horizon. The IoT already exists and is expanding rapidly. […]

Source:: Cisco Security Notice

The Real IoT Opportunity for Enterprises? A Chance to Address Security Risks Head On

By Craig Williams When business leaders think about the Internet of Things (IoT), they tend to focus on the potential opportunities for the enterprise and give far less attention to security risks. That’s a mistake. So, too, is believing that the IoT is only a concept on the distant horizon. The IoT already exists and is expanding rapidly. […]

Source:: Cisco Security Notice

Vulnerability Spotlight: EZB Systems UltraISO ISO Parsing Code Execution Vulnerability

By Talos Group Discovered by Piotr Bania of Cisco Talos Today, Talos is releasing details of a new vulnerability discovered within the EZB Systems UltraISO ISO disk image creator software. TALOS-2017-0342 (CVE-2017-2840) may allow an attacker to execute arbitrary code remotely on the vulnerable system when a specially crafted ISO image is opened and parsed by the UltraISO […]

Source:: Cisco Security Notice