Zum Inhalt springen
DCSO
Engineering Security.
DCSO
  • Über uns
  • Services
    • Incident Response
    • Threat Detection & Hunting
    • Technology Scouting & Evaluation
    • Internet Exposure Monitoring
    • Threat Intelligence
    • Cloud Vendor Assessment
  • Blog
  • Talente
  • ExperTalks
  • Kontakt
Incident?
  • Über uns
  • Services
    • Incident Response
    • Threat Detection & Hunting
    • Technology Scouting & Evaluation
    • Internet Exposure Monitoring
    • Threat Intelligence
    • Cloud Vendor Assessment
  • Blog
  • Talente
  • ExperTalks
  • Kontakt

Search & archives template

Sie befinden sich hier:
  1. Start
  2. Search & archives template

A Curious Case of CVE-2019-19781 Palware: remove_bds

General16. Januar 2020

Vulnerability in Citrix Application Delivery Controller and Citrix Gateway (CVE-2019-19781) – updated Published on December 17 2019, CVE-2019-19781 is a…

Read more

A Look Back at DCSO Insight Day 2019

General14. November 2019

November 2019 13. On 13 November 2019, we welcomed more than 150 customers, partners and friends of DCSO to the…

Read more

Evidence-based Visibility Debugging in Corporate Walled Garden Networks with Mauerspecht

General23. August 2019

At its core, the DCSO Threat Detection & Hunting (TDH) service uses network security monitoring to protect organizations against both…

Read more

Infosecurity Europe 2019 – observations, scouting, and a recap

General14. Juni 2019

Recently, DCSO’s Technology Scouting and Evaluation (TSE) service visited the Infosecurity Europe conference in London. Infosecurity, also known as InfoSec,…

Read more

16th German IT Security Congress

General5. Juni 2019

From May 21 to 23, 2019, DCSO’s Technology Scouting and Evaluation (TSE) team visited the 16th German IT Security Congress,…

Read more

Modern authentication services – More than passwords plus smart card

General7. Mai 2019

Passwords have been used to secure access to protected assets since ancient times. Despite many attempts to find a better…

Read more

Facebook Documents Leaked to UK Parliament

General26. März 2019

The year 2018 ended on a bitter note for Facebook when an extraordinary chain of events led to the U.K.…

Read more

Enterprise Malware-as-a-Service: Lazarus Group and the Evolution of Ransomware

General18. März 2019

In an interesting twist to the use of ransomware, an attacker leveraged a vulnerability in a plug-in for a remote-monitoring…

Read more

Pegasus/Buhtrap analysis of the malware stage based on the leaked source code

Use Cases14. März 2019

In April of 2015, Kaspersky released a report on a Trojan / Remote Access Tool (RAT) targeting financial institutions in…

Read more

RSA Conference 2019: Trust (not Quantum), Blockchain, AI – and the advent of DevSecOps

General11. März 2019

A Trust Enabled World – that is the vision that guided the opening keynote speech of the RSA Conference 2019,…

Read more

Innovation Sandbox Contest: What Cyber Security Trends can the world expect?

General5. März 2019

“Same procedure as last year, Miss Sophie?” – “Same procedure as every year, James!” In line with this mantra, this…

Read more

Part 2: Using MISP-dockerized

Use Cases27. Februar 2019

As demonstrated in Part 1 of this blog article, installing MISP with MISP-dockerized is quite simple. All you have to…

Read more

Part 1: MISP in a box

Use Cases25. Februar 2019

MISP is a free open source platform developed by the MISP project team that primarily serves the purpose of sharing…

Read more

SuriCon 2018

General23. Januar 2019

Every year, there are a few “must-attend” events that are fixtures on every security enthusiast’s calendar. Besides the obvious “big…

Read more

PHP PEAR Software Supply Chain Attack

General22. Januar 2019

On January 19, 2019 the PEAR project announced, that it’s installation script had been tampered with: https://twitter.com/pear/status/1086634389465956352:

Read more

Our Best Wishes

General21. Dezember 2018
Read more

Breach & Attack Simulation: "Next-Generation" Vulnerability Management?

General20. Dezember 2018

In the ongoing game of cat-and-mouse in the cybersecurity space, the dimensions of defense strategies evolve, especially for enterprise-grade organizations.…

Read more

DCSO’s Insight Day 2018

General16. November 2018

November 2018 13. On 13 November 2018, we opened the doors to Berlin’s Humboldt-Box at 9 am, thus launching DCSO’s…

Read more

Wanted: The Best Threat Intelligence Provider with APT Indicators

General22. Oktober 2018

APT’s – advanced persistent threats – are among the most feared threats in the cyberspace. They are well known for…

Read more

BruCON 0x0A

General17. Oktober 2018

BruCON is an annual IT-security conference, held in the historical lecture hall of the University of Gent in October. As…

Read more

it-sa 2018 – Impressions and Trends

General15. Oktober 2018

Last week, DCSO’s TSE team visited the annual it-sa fair & conference taking place at the Nuremberg Exhibition Centre from…

Read more

User and Entity Behavior Analytics

General11. Oktober 2018

Uncovering unknown threats in an enterprise environment might be one of the most significant challenges that security operations centers have…

Read more

UP18 – it-sa's cyber startup pitch contest

General9. Oktober 2018

For the first time, the largest German cybersecurity conference it-sa was started by a warm-up event to get into the…

Read more

Thoughts on the Equifax 2017 Breach Report

General5. Oktober 2018

The United States Government Accountability Office (GAO) recently released a report on the 2017 Equifax data breach. The GAO report…

Read more

Data in mysterious places – the subtle crisis of data harvesting apps

General25. September 2018

Recent news stories highlight the danger of unwanted data exfiltration by popular applications. The use of apps is increasingly important…

Read more

Cloud Security 101 – Do you already CASB?

General17. September 2018

“Hey, Mike, where can I find our current project calculation? Our client keeps asking questions … ” “It’s in our…

Read more

Intercepting Twofish-encrypted HTTP traffic with mitmproxy

Use Cases3. September 2018

With mitmproxy, a ncurses-based tool to intercept HTTP(s) connections is available as Open Source Software. This blog post reflects a…

Read more

The impact of GDPR on security research: A look at WHOIS

General20. August 2018

When individuals, companies, organizations, and governments register a domain, they are required to provide information to a domain registration company,…

Read more

Mobile Threat Defense – trying to extend established Enterprise Mobility Management

General13. August 2018

Portable devices like smartphones and tablets have developed from being just single-purpose communication tools to becoming valuable assets in business…

Read more

Using "magic" DNS-resolutions to track suspicious domains

Use Cases31. Juli 2018

APT operators are humans, and humans are lazy and make mistakes. A common pattern seen in APT operations is “sleeping…

Read more

Spectre-NG: LazyFP State Restore Vulnerability (CVE-2018-3665)

Use Cases10. Juli 2018

The first publicly accessible indication of a new Spectre-NG vulnerability appeared on June 5, 2018, in a commit message on…

Read more

Cryptomining: A Growing Threat

General20. Juni 2018

The rising prominence of cryptocurrencies worldwide incentivizes criminals to expand cryptocurrency mining operations, particularly when using compromised infrastructure forces others…

Read more

Infosecurity Europe 2018 – Trends and Innovations

General20. Juni 2018

Just recently, TSE visited the annual Infosecurity Europe conference to stay up-to-date with recent trends and innovations in the cyber…

Read more

Introducing Security Orchestration and Automation

Use Cases13. Juni 2018

One of the main tasks in TSE’s research regarding the IT security market is to identify new trends and developments…

Read more

Lower Barriers to Entry Fueling Growth in Cybercrime, Espionage and Even Security Research

General4. Juni 2018

Over the past few years, a very small number of cybercriminals have become quite sophisticated and are able to cause…

Read more

Girls' Day 2018 @ DCSO

General8. Mai 2018

Like last year, we are very happy to have hosted Girls’ Day 2018. We had a great experience with the…

Read more

Impressions of the RSA Conference 2018 part II – On the expo floor

General27. April 2018

Like last year, the main expo filled two complete buildings with more than 550 vendors. The floors were dominated by…

Read more

Impressions of the RSA Conference 2018 part I – Keynotes and Innovations

General27. April 2018

Later than usual, the annual RSA Conference in San Francisco started on April 16th. Breaking another record, about 50.000 participants…

Read more

PITS 2018

General15. März 2018

September 2018 10. – 11. The PITS − Public IT Security − is a 2-day specialist congress for IT and…

Read more

New Cyber Security Laws put Compliance and Policy in the Spotlight

General8. März 2018

China’s cyber security law released in 2017, with a substantial implementing phase of one year, marks a significant overhaul of…

Read more

Tips and Tricks from Daily Testing

Use Cases23. Februar 2018

Testing security products in an enterprise environment can be a tedious task. In between pressing timelines, infrastructure nightmares and pushy…

Read more

Welcome

General15. Februar 2018

Hello and welcome Readers, We are excited about launching our new DCSO blog! Our blog platform will give us the…

Read more
Mehr laden
DCSO
© DCSO Deutsche Cyber-Sicherheitsorganisation GmbH. Website by Adash.

info@dcso.de Impressum Datenschutzerklärung

Go to Top