respond quickly to cyber incidents thanks to automated cyber defence
Blog

Automation as a Game-Changer for your Cyber Defence

illustrated guide for analysing dfir event logs with velociraptor
Blog

CSIRT Insights: Optimisation of Event Log Analysis and Recording in DFIR

Learn how to detect attackers on mobile devices and to secure smartphones and tablets.
Blog

Detecting Attackers on Smartphones and Tablets [Part 2]

Prevention instead of Reaction. How a Compromise Assessment Protects your Data.
Blog

Prevention instead of Reaction: How a Compromise Assessment Protects your Data

Leaked Credentials or how Black Basta attacker penetrate networks.
Blog

Leaked Credentials: How Black Basta attacker penetrate networks

Mobile stalkerware on the rise: how to keep your devices secure? [PART 1]
Blog

Mobile stalkerware on the rise: how to keep your devices secure? [PART 1]

AI against cyber attacks, but not without human expertise
Blog

AI against cyber attacks – not without human expertise

infoguard-alert-cyber-security-ransomware-blog
Blog

AWS ransomware - and what's really behind it

InfoGuard CSIRT: (New) Volume Business: Fully Automated Scan and Reasonable Ransom Amount (InfoGuard Cyber Security Blog)
Blog

(New) Volume Business: Fully Automated Scan and Reasonable Ransom Amount

Netscaler vulnerability exploited by attacker group (InfoGuard Cyber Security Blog)
Blog

InfoGuard CSIRT Warning: Attacker Group Using Netscaler Vulnerability to Steal Credentials

Malware camouflage: threat through manipulated command lines (InfoGuard Cyber Security Blog)
Blog

Malware Cloaking: the Growing Threat of Manipulated Command Lines

InfoGuard Cyber Security CTI Insights: Ransomware writing in the middle of binary numbers
Blog

Cyber Threat Intelligence Insights: Timing of Ransomware Incidents

Artificial Intelligence and Machine Learning: 6 Possible Applications of ChatGPT in Cyber Security and Cyber Defence
Blog

ChatGPT & Co. – the future of cyber security?

InfoGuard Cyber Security Blog: The seven mortal sins - how hackers can easily compromise networks
Blog

The seven mortal sins: how hackers can easily compromise networks

InfoGuard blog post: enhancing security through Cyber Threat Intelligence (CTI)
Blog

Enhancing security through Cyber Threat Intelligence – a review of the CTI year

infoguard-csirt-alert-cyber-security-blog-malvertising
Blog

[Alert] InfoGuard CSIRT issues a “malvertising” warning

Blog

Advent, Advent, the school is “burning”! [Part 3]

infoguard-csirt-alert-cyber-security-blog-malware-raspberry-robin
Blog

[Alert] InfoGuard CSIRT issues a warning about infected flash drives

Blog

Advent, Advent, the school is “burning”! [Part 2]

infoguard-advent-the-school-is-burning-cyber-security
Blog

Advent, Advent, the school is “burning”! [Part 1]

infoguard-zugriffs-auf-authentisierungstokens-von-team-accounts-was-ist-dran
Blog

[Q&A] Access to authentication tokens from Teams accounts – What’s that all about?

Blog

How do I protect my Azure account?

Blog

InfoGuard CSIRT is warning of e-banking fraud

infoguard-blog-cyber-resilience-part2-en
Blog

Cyber Resilience: CSIRT insights and emergency plan for top management

infoguard-cyber-security-adventskalender-2021-en
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 3]

infoguard-cyber-security-adventskalender-2021-en
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 2]

infoguard-cyber-security-adventskalender
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 1]

infoguard-stephan-berger-swiss-cyber-storm-2021-ransomware-part-2
Blog

Ransomware – a Latent Threat [Part 2]

infoguard-ransomware-stephan-berger-swiss-cyber-storm
Blog

Ransomware – a Latent Threat [Part 1]

infoguard-blog-azure-en
Blog

Dark clouds on the security horizon – Azure accounts compromised

Blog

[INFOGUARD CSIRT WARNING] When the ransomware arrives via VPN

ig-blog-ransomware-parceltrick
Blog

[InfoGuard CSIRT Warning] Currently Ransomware Attacks are underway with the Parcel Trick

infoguard-blog-osterblog
Blog

The Easter Bunny as a Threat Actor – hunting for the tracks left behind

microsoft-exchange-vulnerabilities–cleaning-tool-is-not-removing-all-footholds
Blog

Microsoft Exchange vulnerabilities – MS cleaning tool is not removing all adversaries footholds

infoguard-blog-incident-response-en
Blog

[Video] A cyber thriller in 48 hours

infoguard-blog-incident-response
Blog

Incident response: the police are your friends and helpers

infoguard-blog-adobe-flash-player-en
Blog

The “End-of-Life” for Adobe Flash Player

InfoGuard Incident Response
Blog

[Video] InfoGuard Incident Response − a real Ransomware attack on a Swiss customer

infoguard-cyber-security-coronavirus
Blog

Red alert ‒ the hacking trick with Coronavirus

infoguard-cyber-security-blog-incident-response-video
Blog

[Video] Incident Response – the 5 most common mistakes

infoguard-cyber-security-blog-microsoft-rdp
Blog

Microsoft RDP – Another serious security vulnerability

infoguard-cyber-security-blog-emotet-trickbot-ryuk
Blog

Emotet, Trickbot and Ryuk – are these the worst threesome since computer viruses started?

phishing
Blog

Warning ‒ Targeted attacks on Swiss companies

infoguard-cyber-security-whatsapp-sicherheitsluecke
Blog

WhatsApp, Mobile E-Banking & Co. – How to play it safe

infoguard-cyber-security-blog-emotet-dynamite-phishing
Blog

Dynamite Phishing ‒ Emotet can forge e-mails almost perfectly

infoguard-cyber-security-blog-fileless-malware
Blog

The fileless malware myth

Blog

What Purple Teaming has in common with “cops and robbers”

Blog

Red vs. blue ‒ why does the Cyber Defence Center set new standards

Blog

Cyber Defence Center – the SOC of the future