Blog

21 Results / Page 1 of 3

Background

Cyber security White Hat / September 13, 2023

Analysing a latent malware infection on a recently MDE-onboarded machine (Part 2)

Recently, an interesting latent malware infection was found on a newly onboarded machine at one of our clients (Client). Microsoft Defender for Endpoint (MDE) reported anomalies about the computer shortly after onboarding, but uncovering the inner workings of the malware and the infection methods required thorough investigation We present the second part of the investigation ...

Read more trending_flat

Cyber security White Hat / September 6, 2023

Analysing a latent malware infection on a recently MDE-onboarded machine (Part 1)

Recently, an interesting latent malware infection was found on a newly onboarded machine at one of our clients (Client). Microsoft Defender for Endpoint (MDE) reported anomalies about the computer shortly after onboarding, but uncovering the inner workings of the malware and the infection methods required thorough investigation, which anonymized version we present in this article ...

Read more trending_flat

Cyber security Csaba Krasznay / August 22, 2023

Reflections on financing European cyberdefence

Building cybersecurity is expensive. In a threat environment that is changing daily, newer and newer defence technologies are emerging that would need to be operated in a highly skills-scarce environment. Moreover, new cybersecurity technologies require knowledge that may not be available in the professional domain, such as artificial intelligence. However, compliance requirements such as NIS2 ...

Read more trending_flat

Cyber security Csaba Krasznay / July 4, 2023

SIEM, EDR, XDR, MDR – what do they mean and how do they effect the daily information security operation?

The information security profession is full of three- and four-letter acronyms. Those who just listen to a cybersecurity lecture are likely to lose the plot very quickly. But sometimes even those in the industry are not necessarily able to keep up with the incredibly fast pace of development dictated by the vendors, which means that ...

Read more trending_flat