Cobalt Strike: Looking for the Beacon
G Data Security
by
3d ago
During an incident response, looking for malware is often akin to looking for a needle in a hay stack. To complicate matters further, in the case of Cobalt Strike you often have no idea what that needle even looks like. And time is not on your side.       ..read more
Visit website
New "Agent Tesla" Variant: Unusual "ZPAQ" Archive Format Delivers Malware
G Data Security
by
2w ago
A new variant of Agent Tesla uses the uncommon compression format ZPAQ to steal information from approximately 40 web browsers and various email clients. But what exactly is this file compression format? What advantage does it provide to threat actors? And why it is assumed that the version of Agent Tesla is “new”?       ..read more
Visit website
Hostile Takeover: Malicious Ads via Facebook
G Data Security
by
1M ago
Criminals hijack business accounts on Facebook and run their own advertising campaigns in someone else's name and at the expense of those affected. This quickly results in thousands of euros in damages for the actual account holders - not to mention the damage to their reputation.       ..read more
Visit website
Robots: Cybercriminals of the Future?
G Data Security
by
2M ago
Artificial intelligence and adjacent technologies have been causing quite the stir lately. Many are concerned that AI is going to give rise to new and potentially completely machine-generated forms of criminal attacks. Let us look at some of those concerns.       ..read more
Visit website
NIS-2: EU Directive Takes a Massive Step towards Increased Security
G Data Security
by
4M ago
NIS-2 aims to establish an EU wide common security standard for critical infrastructures and adjacent industries as well as vital supply chains. Here is a brief recap - and also a good reason why even non critical industries should pay close attention.       ..read more
Visit website
Vulnerabilities: Understand, mitigate, remediate
G Data Security
by
8M ago
As the value of data has grown managing vulnerabilities effectively is essential for the success of your organizations’ security and minimizing the impact of successful attacks. But: What are those vulnerabilities, anyway? Eddy Willems explains.       ..read more
Visit website
Verdict-as-a-Service moves malware scanning from the endpoint to the cloud
G Data Security
by
9M ago
Today, no one can do without data at work. However, malware often lurks in shared resources. Stefan Hausotte and his team have developed a solution for this with G DATA Verdict-as-a-Service. He reveals more in an interview.       ..read more
Visit website
Emergency Drills: Why Failing is Part of Success
G Data Security
by
10M ago
There are many silent heroes and heroines out there who remain largely unsung. This article deals with one of them, and how his actions can teach valuable lessons to organisations and their IT security today.       ..read more
Visit website
ChatGPT: What AI holds in store for security
G Data Security
by
11M ago
ChatGPT has made quite a splash in recent weeks. The AI-supported chatbot impresses with its convincingly human-looking way of answering questions and interacting with users. This arouses enthusiasm as well as concerns - including in the world of IT security.       ..read more
Visit website
IT security trends 2023 (part 2): Why iPhones are hackers' best friends, rootkits are celebrating a renaissance, and uncertainty is bad for IT security
G Data Security
by
1y ago
In the second part of the blog series, Tim Berghoff, Stefan Decker and Karsten Hahn explore current trends in IT security. Their views focus on the effects on IT security of the past years of crisis, the importance of smartphones in cyber attacks, and the return of rootkits as part of the attack chain.       ..read more
Visit website

Follow G Data Security on FeedSpot

Continue with Google
Continue with Apple
OR