Jaff Ransomware: Player 2 Has Entered The Game

By Talos Group This post was written by Nick Biasini, Edmund Brumaghin and Warren Mercer with contributions from Colin Grady Summary Talos is constantly monitoring the email threat landscape and tracking both new threats as well as changes to existing threats. We recently observed several large scale email campaigns that were attempting to distribute a […]

Vulnerability Spotlight: Hangul Word Processor Remote Code Execution Vulnerability

By Talos Group Talos is disclosing the presence of a vulnerability in Hangul Word Processor. Published by Hancom inc. the Hangul Office Suite, of which Hangul Word Processor is part, is the leading word processing and office productivity suite in South Korea. This vulnerability allows attackers to craft a malicious document that when opened, allows […]

Vulnerability Spotlight: Hangul Word Processor Remote Code Execution Vulnerability

By Talos Group Talos is disclosing the presence of a vulnerability in Hangul Word Processor. Published by Hancom inc. the Hangul Office Suite, of which Hangul Word Processor is part, is the leading word processing and office productivity suite in South Korea. This vulnerability allows attackers to craft a malicious document that when opened, allows […]

Support:Recording Build 116700 available

Source:: Innovaphone

Support:Recording Build 116700 available

Source:: Innovaphone

Das 100%-Netzwerk mit 0% Zinsen

Mit unserem Technologie-Partner Cisco bieten wir Ihnen bis zum 30.06.2017 eine echte 0%-Finanzierung für Ihr neues 100%-Netzwerk an. Unkompliziert und schnell bringen Cisco und Oberberg-Online Ihr Netzwerk auf den Stand der Technik. Einsatzbereit für den 24-Stunden-Betrieb, Video-, Audio, CAD-Anwendungen und die sichere Anbindung von Maschinen und Steuerungssystemen – und das alles zinsfrei verteilt auf 36 […]

Triage Forensics: Leveraging Digital Forensics during Incident Response

By Brad Garnett You have just been notified by a “TLA” (Three Letter Agency), a law enforcement agency, that your organization has suffered a data breach. Depending on your Threat Management Maturity level, you will either approach this methodically or ad-hoc. A TLA notification will generally involve leveraging the expertise of an Incident Response team, […]