Impacket Attack Detection: Introducing Yet Another ETW Tracing Tool
Our Trovent Security Research Team developed its own ETW tracing tool. We’ll explain how YAETWi makes life easier for malware analysts and pentesting experts.
Application control as a security measure: How to avoid dangerous configuration errors
Restricting applications is an important IT protection measure. You must take this into account when configuring application controls.
Our Test: How can you detect C2 traffic in a regular IMAP traffic?
Does the command and control (C2) traffic of an attack transmitted via IMAP remain "invisible"? Or can a C2 agent specially designed for IMAP be detected? We have tested it.
Rising costs: Is cyber insurance still worthwhile?
Insurers are becoming increasingly strict and expensive when it comes to cyber insurance. These are the reasons. And here's how you can react to save costs.
ISO 27001: The right way to deal with technical vulnerabilities
Vulnerability management, catalog of measures, processes, tools, etc.: How can the requirements of the old and adapted ISO 27001 be met with regard to technical vulnerabilities? We answer the most important questions for companies.
Vulnerability management in critical infrastructure
Vulnerability management in critical infrastructure - practical experience from the tank storage industry. To manage risks, you need to know your attack surface in the IT and OT infrastructure. Vulnerability management in critical infrastructure is therefore essential.
Reducing the attack surface through vulnerability management
If we have to assume that the human vulnerability will be exploited sooner or later, the underlying IT infrastructure must be hardened accordingly and the attack surface consistently reduced.