Einträge von Technik Support

Top Three Considerations When Securing Office 365 Email 

By Claudia Martinez Moving to the cloud is a no brainer. It’s far more cost effective than maintaining internal systems. No wonder companies have been transitioning to cloud platforms, like Microsoft Office 365, over the last few years. It’s great for the bottom line. Companies with fewer than 1,000 users can expect to save up […]

Top Three Considerations When Securing Office 365 Email 

By Claudia Martinez Moving to the cloud is a no brainer. It’s far more cost effective than maintaining internal systems. No wonder companies have been transitioning to cloud platforms, like Microsoft Office 365, over the last few years. It’s great for the bottom line. Companies with fewer than 1,000 users can expect to save up […]

CCleaner Command and Control Causes Concern

By Talos Group This post was authored by Edmund Brumaghin, Earl Carter, Warren Mercer, Matthew Molyett, Matthew Olney, Paul Rascagneres and Craig Williams. Note: This blog post discusses active research by Talos into a new threat. This information should be considered preliminary and will be updated as research continues. Introduction Talos recently published a technical […]

CCleaner Command and Control Causes Concern

By Talos Group This post was authored by Edmund Brumaghin, Earl Carter, Warren Mercer, Matthew Molyett, Matthew Olney, Paul Rascagneres and Craig Williams. Note: This blog post discusses active research by Talos into a new threat. This information should be considered preliminary and will be updated as research continues. Introduction Talos recently published a technical […]

Cisco Security Connector: Built for iOS 11

By Joe Malenfant Apple and Cisco have partnered to help businesses in every industry accelerate their mobile transformation. From seamless user experience with collaborative applications to Wi-Fi optimization, the partnership has been grounded in a tangible reality. Apple designed iOS to be simple, intuitive, and powerful, with security built into its core. But while the […]

Cisco Security Connector: Built for iOS 11

By Joe Malenfant Apple and Cisco have partnered to help businesses in every industry accelerate their mobile transformation. From seamless user experience with collaborative applications to Wi-Fi optimization, the partnership has been grounded in a tangible reality. Apple designed iOS to be simple, intuitive, and powerful, with security built into its core. But while the […]

CCleanup: A Vast Number of Machines at Risk

By Talos Group This post was authored by: Edmund Brumaghin, Ross Gibb, Warren Mercer, Matthew Molyett, and Craig Williams Introduction Supply chain attacks are a very effective way to distribute malicious software into target organizations. This is because with supply chain attacks, the attackers are relying on the trust relationship between a manufacturer or supplier […]

CCleanup: A Vast Number of Machines at Risk

By Talos Group This post was authored by: Edmund Brumaghin, Ross Gibb, Warren Mercer, Matthew Molyett, and Craig Williams Introduction Supply chain attacks are a very effective way to distribute malicious software into target organizations. This is because with supply chain attacks, the attackers are relying on the trust relationship between a manufacturer or supplier […]

Threat Round Up for Sept 8 – Sept 15

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 08 and September 15. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our […]

Threat Round Up for Sept 8 – Sept 15

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between September 08 and September 15. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our […]