TechTalk

The registered number of IT security incidents as a result of the rapid development of new and adapted cyber attack methods is worrying - and can sometimes have serious financial consequences as well as reputational damage for companies.
A SIEM makes the work of IT security specialists more effective and increases the IT security level of companies decisively - if some relevant aspects are considered before the SIEM implementation.
We will first begin at the entry point of this RAT and analyze its executed code before we jump into all possible modules this RAT possesses.
According to Malware Bazaar, samples have been distributed since around mid-January. The final payload is a .NET RAT, which allows the attacker to send commands to the infected system.
The increasing complexity of development of new attack methods or variants of already known ones pose challenges for signature-based detection methods. Additional approaches are needed that are capable of supporting such a system where signatures and rules can no longer be used effectively.
This article is intended to provide a deeper insight into the important topic of reporting obligations in the event of an IT security incident.
In order to protect one's own company against phishing, awareness must first and foremost be created among employees. This can be done through workshops, phishing simulation or company policies.
In Active Directory, groups are used to group user accounts and computer accounts into units that are then easier to manage. First, it is important to understand why groups and group memberships are relevant.
BSI has set up a model that divides the procedure into 6 different phases, which is very finely granulated compared to other models.
How to find a specific "Object of Interest" or even several objects that have certain properties? The answer to this is as logical as it is simple: you need to know and specify the right search filters.
Cookie Consent with Real Cookie Banner