Recognized Excellence in Trustworthy Product Development and Pervasive Data Protection

By John N. Stewart Last week at RSA, the 2017 Info Security Products Guide Global Excellence Awards honored three teams from the Cisco Security and Trust Organization for their work in leading security practices. Source:: Cisco Security Notice

Recognized Excellence in Trustworthy Product Development and Pervasive Data Protection

By John N. Stewart Last week at RSA, the 2017 Info Security Products Guide Global Excellence Awards honored three teams from the Cisco Security and Trust Organization for their work in leading security practices. Source:: Cisco Security Notice

Korean MalDoc Drops Evil New Years Presents

By Talos Group This blog was authored by Warren Mercer and Paul Rascagneres. Talos has investigated a targeted malware campaign against South Korean users. The campaign was active between November 2016 and January 2017, targeting a limited number of people. The infection vector is a Hangul Word Processor document (HWP), a popular alternative to Microsoft […]

Korean MalDoc Drops Evil New Years Presents

By Talos Group This blog was authored by Warren Mercer and Paul Rascagneres. Talos has investigated a targeted malware campaign against South Korean users. The campaign was active between November 2016 and January 2017, targeting a limited number of people. The infection vector is a Hangul Word Processor document (HWP), a popular alternative to Microsoft […]

Serenity Now! A better way to malware analysis.

By Joe Malenfant Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for! Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are […]

Serenity Now! A better way to malware analysis.

By Joe Malenfant Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for! Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual environment and see what happens. There are […]

Tech Quickie #1 – Factory Reset bei Innovaphone IP241

Heute gibt es die erste Ausgabe unseres neuen Video-Formats. Hier erklären wir, um was es dabei gehen wird: In der ersten Ausgabe geht es um den Factory Reset bei Innovaphone IP241, IP240, IP230 und IP240A. Es kommt ja eher selten vor, dass man ein Innovaphone Endgerät auf Werkseinstellungen zurücksetzen muss, aber eben weil das nicht oft […]