Network

Cyber attacks often lead to unauthorized access to personal or confidential data. If the data is stolen from the organizational network in the process, it is referred to as a data leak or data exfiltration. The motives for data theft are diverse and range from industrial espionage and blackmail to resale or identity theft. Recently, there has also been a…
The SECUINFRA Falcon Team analyzed a recent attack conducted by the south-Asian Advanced Persistent Threat group „Bitter“.
Monitoring the network infrastructure is an important addition to existing monitoring measures. It complements the information provided by a SIEM system.
The increasing complexity of development of new attack methods or variants of already known ones pose challenges for signature-based detection methods. Additional approaches are needed that are capable of supporting such a system where signatures and rules can no longer be used effectively.
Cookie Consent with Real Cookie Banner