Browse through our selection of IT security news, as well as presentations, television broadcasts, articles and press releases by or about Oneconsult.

We gladly support journalists and other media professionals free of charge in the field of information and IT security. Please contact Christoph Baumgartner (CEO) by phone +41 43 377 22 22 or by email info@oneconsult.com. We look forward to hearing from you!

Below you find a selection of presentations, television broadcasts, newspaper and magazine articles, as well as press releases by or about Oneconsult.

On a digital search for clues

They are the Studers and Sherlock Holmes watchmen of the digital age: after attacks, IT forensic experts collect evidence and try to find out what the attackers are up to.

IT forensics article in Computerworld by Jens Stark, based on an interview with Tobias Ellenberger, Chief Operating Officer at Oneconsult. The article has also been published by com! magazine.
Read the article in German

27. Nov. 2018, 10am: Netwrix Webinar with Yves Kraft

Hacker explains how attackers can get into corporate networks unnoticed

 

“Company XYZ has been hacked!” – Why it can hit everyone and what to do against it

 

Link to Netwrix Webinar-Registration
(held in German)

[more]

it-sa 2018 a complete success!

Thank you for the many visits to our booth at the it-sa Nuremberg!

The curiosity and the fun to hack our chocolate safe were great. Congratulations to all who succeeded!

[more]

Oneconsult present at the SWISS CYBER STORM in Bern on October 30, 2018

Welcome to the Oneconsult booth!
→ Win a hak5 field kit
→ Hack (not chop!) chocolate – you have to crack the safe and earn it!
→ Presentation by COO Tobias Ellenberger at the SCS on “The 3 most important aspects of (non-)successful incident response”.

[more]

CIO Bulletin, September 2018: Oneconsult among the 10 Best Cyber Security Companies

According to CIO Bulletin, Oneconsult provides world-class cyber security services in the areas of Penetration Testing / Ethical Hacking, ISO 27001 Security Audits and Incident Response & IT Forensics.

Overview and here to the detailed report

Cybersecurity quick check for SME

Cyberattacks are now part of our daily lives. SMEs must therefore have a way to quickly determine whether their technical, organisational and staff-related measures can protect them adequately against cyber-risks. A high-calibre group of specialists has therefore developed a quick-check for this purpose. Oneconsult supports this useful quick check. Further information 

And here is your direct link to the ​
Cybersecurity quick check for SME

About domain administrators, single sign-on and malware

by Marco Wohler

The danger from domain administrator accounts is often underestimated. This article describes how attackers can compromise an entire domain. In general, authorizations are distributed too loosely and (partly existing) security mechanisms are not used. [read the German article]

PowerShell VI – Defense

by Frank Ully

This is the sixth and final instalment in a multi-part series about Windows PowerShell and how attackers abuse it, how incident responders can detect these attacks – and how IT staff can prevent them in the first place. This article describes which measures IT security managers can implement to protect their organizations against PowerShell attacks. [read the German article]

PowerShell V – Forensic analysis of PowerShell attacks

by Frank Ully

This is the fifth article in a multi-part series about Windows PowerShell and how attackers abuse it, how incident responders can detect these attacks – and how IT security managers can prevent them in the first place. This article introduces methods that incident responders and IT forensic analysts can use to investigate PowerShell attacks, including memory analysis. [read the German article]

PowerShell IV – Memory forensics

by Frank Ully

This is the fourth article in a multi-part series about Windows PowerShell and how attackers abuse it, how incident responders can detect these attacks – and how IT security managers can prevent them in the first place. This article provides a general introduction to memory forensics, a relatively new method of investigation for incident responders and IT forensic experts against modern threats such as PowerShell attacks. [read the German article]