TechTalk

Here you will find articles on the latest findings and in-depth analyses in the field of IT security, presenting both current trends and the in-depth expertise of our cyber defense experts. Immerse yourself in the world of cyber security, enrich your knowledge and stay at the forefront of technological progress.

In order to protect one's own company against phishing, awareness must first and foremost be created among employees. This can be done through workshops, phishing simulation or company policies.
In Active Directory, groups are used to group user accounts and computer accounts into units that are then easier to manage. First, it is important to understand why groups and group memberships are relevant.
BSI has set up a model that divides the procedure into 6 different phases, which is very finely granulated compared to other models.
How to find a specific "Object of Interest" or even several objects that have certain properties? The answer to this is as logical as it is simple: you need to know and specify the right search filters.
In order to shed some light on the subject, we would like to look at a few facts and figures about ransomware as well as a typical course of attack.
That a compromised mailbox is an extremely unpleasant situation is something everyone should be able to imagine. In a recent case we have investigated, attackers have been particularly clever.
In this article, we will look at artifacts that should always be collected during an incident on a Windows-based system to get the best possible picture of what happened.
In Active Directory, domains are used to emulate organizational structures; a domain is always an organizational unit with a unique name that contains, among other things, specific security policies and settings.
Having previously made a name for itself on the criminal scene by attacking major companies such as Quanta Computer and Invernergy, REvil's latest attack on software company Kaseya and its update service is believed to have affected several hundred companies worldwide.
In the event of an attack, companies should take appropriate countermeasures with professional help. The tool of choice here is Digital Forensics & Incident Response (DFIR).
In addition to the expected IOCs for the ProxyLogon/Hafnium vulnerability, our analysis identified one IOC of another vulnerability.
Log management describes the centralized storage of event logs and the ability to search and analyze this data. The benefits of a solid log management solution are manifold and span different areas.
Cookie Consent with Real Cookie Banner