Threat Detection

Ever faster and more sophisticated cyber attacks make a Security Operations Center (SOC) mandatory for every company. However, this is too much for most companies and they therefore start looking for an external partner. We explain what is important when choosing a provider and which criteria are important for small, medium-sized and large companies.
A free survival game called "PirateFi" on the Steam online game store has been distributing the information-stealing malware Vidar to unsuspecting players. Last week, Valve removed a game from its online store because users raised concerns about malware warnings from anti-virus software after launching the game. After removing the game, the SECUINFRA Falcon team analyzed the malware and determined that the game was an attempt to trick players into installing an infodump called "Vidar". As the game advertisement contained references to cryptocurrencies and blockchain technology, we believe this was a lure specifically targeting players interested in these topics.
Cyber attacks often lead to unauthorized access to personal or confidential data. If the data is stolen from the organizational network in the process, it is referred to as a data leak or data exfiltration. The motives for data theft are diverse and range from industrial espionage and blackmail to resale or identity theft. Recently, there has also been a…
Monitoring the network infrastructure is an important addition to existing monitoring measures. It complements the information provided by a SIEM system.
The increasing complexity of development of new attack methods or variants of already known ones pose challenges for signature-based detection methods. Additional approaches are needed that are capable of supporting such a system where signatures and rules can no longer be used effectively.
Cookie Consent with Real Cookie Banner