What is the Body Language of Your Encrypted Network Traffic Really Saying?
By TK Keanini Imagine this scenario – you walk into a meeting room with a colleague and they are sitting at the table with their arms crossed. You immediately think to yourself, this meeting is not going to go well, this person is already displeased with me and I have not said anything yet. However, […]
Cyber, APT und was Geheimdienste damit zu tun haben
Als Überraschungsredner der diesjährigen 10. Troopers Security Konferenz war der bekannte Hacker „The Grukq“ angereist. Er beleuchtet die Bedrohungen im Rahmen von Wirtschaftsspionage, die mit Hilfe internationaler Geheimdienste durchgeführt wird. Insbesondere vergleicht er das sehr unterschiedliche Vorgehen der Dienste in den USA, China und Russland. Was dabei herausgestellt werden kann ist, dass Unternehmen nicht aufgrund purer […]
Player 1 Limps Back Into the Ring – Hello again, Locky!
By Talos Group This post was authored by Alex Chiu, Warren Mercer, and Jaeson Schultz. Sean Baird and Matthew Molyett contributed to this post. Back in May, the Necurs spam botnet jettisoned Locky ransomware in favor of the new Jaff ransomware variant. However, earlier this month Kaspersky discovered a vulnerability within Jaff which allowed them […]
Player 1 Limps Back Into the Ring – Hello again, Locky!
By Talos Group This post was authored by Alex Chiu, Warren Mercer, and Jaeson Schultz. Sean Baird and Matthew Molyett contributed to this post. Back in May, the Necurs spam botnet jettisoned Locky ransomware in favor of the new Jaff ransomware variant. However, earlier this month Kaspersky discovered a vulnerability within Jaff which allowed them […]
Control Your Own Security
By John N. Stewart Digitization continues to change business at an amazing rate and in many ways. As business leaders around the world embrace ‘Digital‘ to simplify, automate, and deliver innovation, they’re no longer simply using Information Technology to run their businesses; IT is enabling it. IT is the vital lifeblood of a business and […]
Control Your Own Security
By John N. Stewart Digitization continues to change business at an amazing rate and in many ways. As business leaders around the world embrace ‘Digital‘ to simplify, automate, and deliver innovation, they’re no longer simply using Information Technology to run their businesses; IT is enabling it. IT is the vital lifeblood of a business and […]
Introducing Threat Grid for Meraki MX
By Lindsay van Gemert Back in July we announced the integration of Cisco Advanced Malware Protection with the Meraki MX. The AMP integration with the MX provided a simple and effective way for MX customers to detect, monitor and remediate advanced threats in their environment. We’re now taking this protection a step further with the […]

