By David McGrew Security owns a complex relationship with privacy, one that can work to protect privacy or undermine it. It is often a compromise, one for the other. Enterprises and other organizations regularly balance this relationship when protecting information systems. I am excited about Cisco’s launch of Encrypted Traffic Analytics (ETA), which offers a better balance point […]

Source:: Cisco Security Notice

By David McGrew Security owns a complex relationship with privacy, one that can work to protect privacy or undermine it. It is often a compromise, one for the other. Enterprises and other organizations regularly balance this relationship when protecting information systems. I am excited about Cisco’s launch of Encrypted Traffic Analytics (ETA), which offers a better balance point […]

Source:: Cisco Security Notice

Fortinet to Announce Second Quarter 2017 Financial Results

Source:: Fortinet

Fortinet to Announce Second Quarter 2017 Financial Results

Source:: Fortinet

By Talos Group This blog was authored by Paul Rascagneres Executive Summary We recently wrote about the KONNI Remote Access Trojan (RAT) which has been distributed by a small number of campaigns over the past 3 years. We have identified a new distribution campaign which took place on 4th July. The malware used in this campaign has similar […]

Source:: Cisco Security Notice

By Talos Group This blog was authored by Paul Rascagneres Executive Summary We recently wrote about the KONNI Remote Access Trojan (RAT) which has been distributed by a small number of campaigns over the past 3 years. We have identified a new distribution campaign which took place on 4th July. The malware used in this campaign has similar […]

Source:: Cisco Security Notice

Ivan Pepelnjak´s Vortrag auf der Troopers 17 Security Konferenz

In diesem Video erklärt Ivan Pepelnjak (in englischer Sprache) das Vorgehen, wenn man Netzwerkprozesse automatisieren will. Dass daran kein Weg vorbei führt, sollte mittlerweile angesichts der Fülle an Aufgaben jedem Administrator klar sein.

Dabei ist es egal, ob man eine kommerzielle Lösung kauft, oder gleich selbst eine Lösung entwickelt, denn auch scheinbar fertige Software muss in jedem Falle an die eigenen Gegebenheiten mittels Programmierung adaptiert werden. Also warum nicht gleich eine schlanke Entwicklung selbst vornehmen?

Dabei sind natürlich alle Bedingungen der Softwareentwicklung zu beachten, insbesondere intensives Testen und Kontrollieren der angesprochenen Komponenten.

Anschaulich und unterhaltsam erläutert Pepelnjak in diesem Video die erforderlichen Bedingungen:

By Talos Group Summary The Nyetya attack was a destructive ransomware variant that affected many organizations inside of Ukraine and multinational corporations with operations in Ukraine. In cooperation with Cisco Advanced Services Incident Response, Talos identified several key aspects of the attack. The investigation found a supply chain-focused attack at M.E.Doc software that delivered a destructive payload disguised […]

Source:: Cisco Security Notice

By Talos Group Summary The Nyetya attack was a destructive ransomware variant that affected many organizations inside of Ukraine and multinational corporations with operations in Ukraine. In cooperation with Cisco Advanced Services Incident Response, Talos identified several key aspects of the attack. The investigation found a supply chain-focused attack at M.E.Doc software that delivered a destructive payload disguised […]

Source:: Cisco Security Notice

By Edward Thomson One of the most talked about topics at the June Infosecurity Europe 2017 conference in London was the General Data Protection Regulation (GDPR). This is a new law concerning data privacy which will render the implications of a data breach much more severe and comes into force in all EU countries from 25th May 2018. […]

Source:: Cisco Security Notice