TechTalk

Here you will find articles on the latest findings and in-depth analyses in the field of IT security, presenting both current trends and the in-depth expertise of our cyber defense experts. Immerse yourself in the world of cyber security, enrich your knowledge and stay at the forefront of technological progress.

What is important when developing use cases? Our SIEM Experts team answers the 5 most frequently asked questions on this topic.  
SIEM use case developers assume a central position in the cyber defense team. But what exactly does SIEM use case development entail? We asked one of our cyber defense consultants in more detail.
With the plethora of daily threats, an organization's cybersecurity teams need to be able to respond immediately and efficiently to existing threat situations.
Monitoring the network infrastructure is an important addition to existing monitoring measures. It complements the information provided by a SIEM system.
What can you do now to uncover existing compromises of your network in a timely manner and thus avert massive financial damage and reputational risks from your company? With a Compromise Assessment (CA), an effective investigation method is available that makes hidden attack activities in your network visible.
In the course of SIEM implementations, one of the biggest challenges for companies is to answer the question of which attack scenarios should be detected by the SIEM system and how these attack scenarios should be prioritized.
The registered number of IT security incidents as a result of the rapid development of new and adapted cyber attack methods is worrying - and can sometimes have serious financial consequences as well as reputational damage for companies.
A SIEM makes the work of IT security specialists more effective and increases the IT security level of companies decisively - if some relevant aspects are considered before the SIEM implementation.
We will first begin at the entry point of this RAT and analyze its executed code before we jump into all possible modules this RAT possesses.
According to Malware Bazaar, samples have been distributed since around mid-January. The final payload is a .NET RAT, which allows the attacker to send commands to the infected system.
The increasing complexity of development of new attack methods or variants of already known ones pose challenges for signature-based detection methods. Additional approaches are needed that are capable of supporting such a system where signatures and rules can no longer be used effectively.
This article is intended to provide a deeper insight into the important topic of reporting obligations in the event of an IT security incident.
Cookie Consent with Real Cookie Banner