Jetzt umsteigen auf den IP-Anschluss für ISDN-Geräte

Jetzt umsteigen auf den IP-Anschluss für ISDN-Geräte, denn wenn erst einmal die Telekom-Kündigung auf dem Tisch liegt, wird es zeitlich kritisch. Dabei haben Sie drei Möglichkeiten: Sie schleifen eines unserer Innovaphone-Gateways zwischen Ihren Telefonanschluss und die alte Anlage ein. Das Gateway simuliert Ihrer alten Anlage das ISDN-Amt und spricht nach außen ISDN, IP, oder eben beides […]

Cerber Spam: Tor All the Things!

By Talos Group This post authored by Nick Biasini and Edmund Brumaghin with contributions from Sean Baird and Andrew Windsor. Executive Summary Talos is continuously analyzing email based malware always looking at how adversaries change and the new techniques that are being added on an almost constant basis. Recently we noticed some novel ways that […]

Cerber Spam: Tor All the Things!

By Talos Group This post authored by Nick Biasini and Edmund Brumaghin with contributions from Sean Baird and Andrew Windsor. Executive Summary Talos is continuously analyzing email based malware always looking at how adversaries change and the new techniques that are being added on an almost constant basis. Recently we noticed some novel ways that […]

Fortinet Earns Title of Ingram Micro Security Partner of the Year

Fortinet Earns Title of Ingram Micro Security Partner of the Year Source:: Fortinet

Fortinet Earns Title of Ingram Micro Security Partner of the Year

Fortinet Earns Title of Ingram Micro Security Partner of the Year Source:: Fortinet

Talos Responsible Disclosure Policy Update

By Talos Group Responsible disclosure of vulnerabilities is a key aspect of security research. Often, the difficulty in responsible disclosure is balancing competing interests – assisting a vendor with patching their product and notifying the general public to prevent a 0-day situation. It is uncomfortable to acknowledge that if a white hat team has discovered […]

Talos Responsible Disclosure Policy Update

By Talos Group Responsible disclosure of vulnerabilities is a key aspect of security research. Often, the difficulty in responsible disclosure is balancing competing interests – assisting a vendor with patching their product and notifying the general public to prevent a 0-day situation. It is uncomfortable to acknowledge that if a white hat team has discovered […]