KONNI: A Malware Under The Radar For Years

By Talos Group Over the past 3 years, Talos has been monitoring the KONNI Remote Administration Tool, which we has not been described elsewhere. During this time it has managed to avoid scrutiny by the security community. The most recent version of the malware allows the operator to steal files, keystrokes, perform screenshots, and execute […]

KONNI: A Malware Under The Radar For Years

By Talos Group Over the past 3 years, Talos has been monitoring the KONNI Remote Administration Tool, which we has not been described elsewhere. During this time it has managed to avoid scrutiny by the security community. The most recent version of the malware allows the operator to steal files, keystrokes, perform screenshots, and execute […]

Einfache und schnelle Backups mit ETERNUS CS800

Die simpelste Backup-Lösung: FUJITSU ETERNUS CS800 – einfache und schnelle Backups für Ihre Datensicherheit. Daten sind Ihr wertvollstes Kapital im Unternehmen. Schützen Sie sich gegen Datenverlust und behalten Sie dabei die Kosten unter Kontrolle. Die zukunftsweisende ETERNUS-Deduplizierungstechnologie reduziert übliche Anforderungen an Plattenkapazität bei Disk-to-Disk-Backups um bis zu 95%. Damit werden schnell verfügbare Backups preiswert verfügbar […]

Threat Round-up for Apr 21 – Apr 28

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between April 21 and April 28. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our […]

Threat Round-up for Apr 21 – Apr 28

By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between April 21 and April 28. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our […]

Respecting Customer Privacy is Not an Option

By Greg Rasner There was recent news of a multi-billion dollar start-up that utilized an actual customer’s network environment for sales demonstrations. To make matters worse, the practice went on for years, without the customer’s (which happened to be a medical facility) permission or knowledge (which had the potential of violating The Health Insurance Portability […]

Respecting Customer Privacy is Not an Option

By Greg Rasner There was recent news of a multi-billion dollar start-up that utilized an actual customer’s network environment for sales demonstrations. To make matters worse, the practice went on for years, without the customer’s (which happened to be a medical facility) permission or knowledge (which had the potential of violating The Health Insurance Portability […]