References
More than 400 organizations from all industries trust our vendor- and product-independent cybersecurity services.

Developing impact through consulting and realization

For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.

An Introduction to Batch File Obfuscation

Batch files are an essential tool many users and administrators use to perform automated tasks. However, attackers also use these batch files to execute malicious commands on a system. To avoid detection by antivirus software, batch files are obfuscated.

(more…)

BGP Hijacking – Data on the Run

From time to time, ships are blown off course, wrecked or, in the worst case, sink together with their cargo. The same can happen to the data that is sent over the Internet every day: It can deviate from its usual route and reach its destination in a big detour, but it can also end up with the wrong recipient altogether and thus be lost to the actual target – usually unintentionally, but in some cases also intentionally.

(more…)

Alert Fatigue – Risks and Measures

Alert fatigue refers to the phenomenon of cyber analysts being overloaded by the high number of alerts issued by security tools. This can lead to analysts overlooking or even ignoring alerts that indicate real attacks in the flood of false positives. This puts the security of the company in question at risk. Find out what the exact risks are and what measures you can take against them here.

(more…)

New iX With Part 3 of the IT Forensics Tutorial on KAPE

In the current issue 09/2021 of iX magazine, Gregor Wegberg, Head of Digital Forensics & Incident Response, presents further features of the “Kroll Artifact Parser and Extractor” (KAPE) in his IT forensics tutorial series: Cybercriminals often use manipulated malicious websites or files to gain initial access to a system for an attack. This leaves traces in the browsing history that can be analyzed using KAPE to determine where and when an attack began.
(more…)

One Step Ahead of the Cybercriminals – Article for SMEs in “Applica” Magazine

Small and medium-sized enterprises (SMEs) are a popular target for cybercriminals. In the current isssue 07/2021 of Applica (available in German only), a magazine issued by the Swiss Painting and Plastering Contractor Association (SMGV), Tobias Ellenberger, COO Oneconsult AG & Vice Chairman Oneconsult International AG, provides an insight into the background and frequent attack methods and details protective measures for SMEs – as the impact of a successful cyber attack can be devastating.
(more…)

iX 07/2021 With New IT Forensics Tutorial

The current issue 07/2021 of iX magazine launches a new IT forensics tutorial series, in which Gregor Wegberg, Head of Digital Forensics & Incident Response, provides a detailed introduction to the Kroll Artifact Parser and Extractor (KAPE) in a total of four articles. KAPE is used in information security incidents to quickly gather relevant information for IT forensic analysis, which can then be used as the basis for assessing and managing the incident.
(more…)

No results found.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 12:00 p.m. and 1:00 p.m. – 5:00 p.m (exception: customers with SLA – please call the 24/7 IRFA emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

QR_CSIRT_2022_EN@2x
Add CSIRT to contacts