By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between June 16 and June 23. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

Source:: Cisco Security Notice

By Jason Lamar I continue to beat the drum for solutions that are simple, open, and automated because it’s something I’m passionate about and Cisco Security is deeply committed to. It’s the clear path forward to security as a force multiplier – helping you to improve your security posture with your existing resources. In March, I gave a […]

Source:: Cisco Security Notice

By Jason Lamar I continue to beat the drum for solutions that are simple, open, and automated because it’s something I’m passionate about and Cisco Security is deeply committed to. It’s the clear path forward to security as a force multiplier – helping you to improve your security posture with your existing resources. In March, I gave a […]

Source:: Cisco Security Notice

By Blake Anderson Introduction Over the past 2 years, we have been systematically collecting and analyzing malware-generated packet captures. During this time, we have observed a steady increase in the percentage of malware samples using TLS-based encryption to evade detection. In August 2015, 2.21% of the malware samples used TLS, increasing to 21.44% in May 2017. During that […]

Source:: Cisco Security Notice

By Blake Anderson Introduction Over the past 2 years, we have been systematically collecting and analyzing malware-generated packet captures. During this time, we have observed a steady increase in the percentage of malware samples using TLS-based encryption to evade detection. In August 2015, 2.21% of the malware samples used TLS, increasing to 21.44% in May 2017. During that […]

Source:: Cisco Security Notice

By Talos Group These vulnerabilities were discovered by Aleksandar Nikolic of Cisco Talos Overview MatrixSSL is a TLS/SSL stack offered in the form of a Software Development Kit (SDK) that is geared towards application in Internet of Things (IOT) devices and other embedded systems. It features low resource overhead and supports many different embedded platforms. It also features […]

Source:: Cisco Security Notice

By Talos Group These vulnerabilities were discovered by Aleksandar Nikolic of Cisco Talos Overview MatrixSSL is a TLS/SSL stack offered in the form of a Software Development Kit (SDK) that is geared towards application in Internet of Things (IOT) devices and other embedded systems. It features low resource overhead and supports many different embedded platforms. It also features […]

Source:: Cisco Security Notice

By TK Keanini Imagine this scenario – you walk into a meeting room with a colleague and they are sitting at the table with their arms crossed. You immediately think to yourself, this meeting is not going to go well, this person is already displeased with me and I have not said anything yet. However, you are making […]

Source:: Cisco Security Notice

By TK Keanini Imagine this scenario – you walk into a meeting room with a colleague and they are sitting at the table with their arms crossed. You immediately think to yourself, this meeting is not going to go well, this person is already displeased with me and I have not said anything yet. However, you are making […]

Source:: Cisco Security Notice

Als Überraschungsredner der diesjährigen 10. Troopers Security Konferenz war der bekannte Hacker „The Grukq“ angereist.

Er beleuchtet die Bedrohungen im Rahmen von Wirtschaftsspionage, die mit Hilfe internationaler Geheimdienste durchgeführt wird. Insbesondere vergleicht er das sehr unterschiedliche Vorgehen der Dienste in den USA, China und Russland.

Was dabei herausgestellt werden kann ist, dass Unternehmen nicht aufgrund purer Größe in den Fokus geraten. Ausschlaggebend ist maßgeblich das entsprechende Know-How. Wenn z.B. die chinesische Führung anordnet, im Bereich Nanotechnologie in den nächsten fünf Jahren den weltweiten Spitzenplatz zu erobern, erfolgt die gezielte Infiltrierung und Gewinnung von Informationen bei denjenigen Unternehmen, deren Wissen und Forschungsergebnisse die eigene Wirtschaft anfordert. Das kann dann auch einen kleinen Mittelständler betreffen, der sich selbst als zu klein und zu bedeutungslos ansieht.

Eine sehr unterhaltsame Stunde mit „The Grukq“ können Sie hier (in englischer Sprache) anschauen: