PowerShell monitoring [1] is one of the measures we strongly recommend to our clients as part of every internal assessment [2]. Often, this measure is not implemented for financial reasons. In this article, I will demonstrate why it is worth investing in monitoring, using the example of an actual attack.This paper was written in 2017 as part of a research project at scip AG, Switzerland. It was initially published online at https://www.scip.ch/en/?labs.20170309 and is available in English and German. Providing our clients with innovative research for the information technology of the future is an essential part of our company culture
In recent years, there has been a considerable uptick in various cyberattacks. In recent years, ther...
Customer-specific malware can be deployed as part of a professional security check. Worms or backdoo...
This paper examines investments in cybersecurity made by users and software providers with a focus o...
PowerShell-based attacks have long been a nightmare for IT security divisions, because they barely l...
Understanding the techniques used in attacks helps in detecting them. MITRE ATT&CK Enterprise Matrix...
The internet is not a safe place, threat actors are exploiting vulnerabilities to compromise compani...
Computer systems today are under constant attack by adversaries that are looking for opportunistic w...
It is of vital importance to screen the development of new or the further development of already exi...
PowerShell is a tool with many uses. In earlier Labs articles, I have covered the basics [1] of Powe...
Perl is considered to be the Swiss Army Knife among programming languages. This title could soon be ...
For the past 15 years, the subject of Intrusion Prevention Systems (IPS) has been present in the hea...
Attacks propagated against IT systems and how they can be curbed has been an important information s...
Too often, companies tend to underestimate the importance of cyber security. Either too expensive or...
Today, virtually every company world-wide is connected to the Internet. This wide-spread connectivit...
International audienceDigitization is the era of today, and today's success is measured based on the...
In recent years, there has been a considerable uptick in various cyberattacks. In recent years, ther...
Customer-specific malware can be deployed as part of a professional security check. Worms or backdoo...
This paper examines investments in cybersecurity made by users and software providers with a focus o...
PowerShell-based attacks have long been a nightmare for IT security divisions, because they barely l...
Understanding the techniques used in attacks helps in detecting them. MITRE ATT&CK Enterprise Matrix...
The internet is not a safe place, threat actors are exploiting vulnerabilities to compromise compani...
Computer systems today are under constant attack by adversaries that are looking for opportunistic w...
It is of vital importance to screen the development of new or the further development of already exi...
PowerShell is a tool with many uses. In earlier Labs articles, I have covered the basics [1] of Powe...
Perl is considered to be the Swiss Army Knife among programming languages. This title could soon be ...
For the past 15 years, the subject of Intrusion Prevention Systems (IPS) has been present in the hea...
Attacks propagated against IT systems and how they can be curbed has been an important information s...
Too often, companies tend to underestimate the importance of cyber security. Either too expensive or...
Today, virtually every company world-wide is connected to the Internet. This wide-spread connectivit...
International audienceDigitization is the era of today, and today's success is measured based on the...
In recent years, there has been a considerable uptick in various cyberattacks. In recent years, ther...
Customer-specific malware can be deployed as part of a professional security check. Worms or backdoo...
This paper examines investments in cybersecurity made by users and software providers with a focus o...