respond quickly to cyber incidents thanks to automated cyber defence
Blog

Automation as a Game-Changer for your Cyber Defence

illustrated guide for analysing dfir event logs with velociraptor
Blog

CSIRT Insights: Optimisation of Event Log Analysis and Recording in DFIR

Prevention instead of Reaction. How a Compromise Assessment Protects your Data.
Blog

Prevention instead of Reaction: How a Compromise Assessment Protects your Data

Leaked Credentials or how Black Basta attacker penetrate networks.
Blog

Leaked Credentials: How Black Basta attacker penetrate networks

Netscaler vulnerability exploited by attacker group (InfoGuard Cyber Security Blog)
Blog

InfoGuard CSIRT Warning: Attacker Group Using Netscaler Vulnerability to Steal Credentials

Cyber incidents: The biggest business risk worldwide (InfoGuard Cyber Security Blog)
Blog

Cyber Incidents as the Biggest Business Risk – How Prevention Should Look Like

Malware camouflage: threat through manipulated command lines (InfoGuard Cyber Security Blog)
Blog

Malware Cloaking: the Growing Threat of Manipulated Command Lines

InfoGuard Cyber Security CTI Insights: Ransomware writing in the middle of binary numbers
Blog

Cyber Threat Intelligence Insights: Timing of Ransomware Incidents

Artificial Intelligence and Machine Learning: 6 Possible Applications of ChatGPT in Cyber Security and Cyber Defence
Blog

ChatGPT & Co. – the future of cyber security?

InfoGuard Cyber Security Blog: The seven mortal sins - how hackers can easily compromise networks
Blog

The seven mortal sins: how hackers can easily compromise networks

infoguard-csirt-alert-cyber-security-blog-malvertising
Blog

[Alert] InfoGuard CSIRT issues a “malvertising” warning

Blog

Advent, Advent, the school is “burning”! [Part 3]

infoguard-csirt-alert-cyber-security-blog-malware-raspberry-robin
Blog

[Alert] InfoGuard CSIRT issues a warning about infected flash drives

infoguard-advent-the-school-is-burning-cyber-security
Blog

Advent, Advent, the school is “burning”! [Part 1]

infoguard-zugriffs-auf-authentisierungstokens-von-team-accounts-was-ist-dran
Blog

[Q&A] Access to authentication tokens from Teams accounts – What’s that all about?

infoguard-blog-eröffnung-cdc-en
Blog

Opening of the new InfoGuard Cyber Defence Center for your security – 24/7

infoguard-blog-cyber-resilience-part2-en
Blog

Cyber Resilience: CSIRT insights and emergency plan for top management

infoguard-cyber-security-evuma
Blog

External Vulnerability Management (eVUMA) – not optional, it’s a duty

infoguard-cyber-security-blog-ddos-rekordjahr-2022-en
Blog

Why a new record number of DDoS attacks are predicted in 2022

infoguard-cyber-security-adventskalender-2021-en
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 3]

infoguard-stephan-berger-swiss-cyber-storm-2021-ransomware-part-2
Blog

Ransomware – a Latent Threat [Part 2]

infoguard-ransomware-stephan-berger-swiss-cyber-storm
Blog

Ransomware – a Latent Threat [Part 1]

Blog

Handle security incidents efficiently with Incident Response Triage

infoguard-blog-osterblog
Blog

The Easter Bunny as a Threat Actor – hunting for the tracks left behind

infoguard-cyber-security-blog-ransomware-hacker
Blog

Ransomware attacks becoming more and more professional – and dangerous

infoguard-blog-incident-response-en
Blog

[Video] A cyber thriller in 48 hours

infoguard-blog-adobe-flash-player-en
Blog

The “End-of-Life” for Adobe Flash Player

infoguard-blog-backup-and-recovery
Blog

Why you should be treating your company data as if it were precious crown jewels

infoguard-cyber-security-coronavirus
Blog

Red alert ‒ the hacking trick with Coronavirus

infoguard-cyber-security-blog-incident-response-video
Blog

[Video] Incident Response – the 5 most common mistakes

infoguard-cyber-security-blog-microsoft-rdp
Blog

Microsoft RDP – Another serious security vulnerability

infoguard-cyber-security-blog-emotet-trickbot-ryuk
Blog

Emotet, Trickbot and Ryuk – are these the worst threesome since computer viruses started?

phishing
Blog

Warning ‒ Targeted attacks on Swiss companies

infoguard-cyber-security-blog-emotet-dynamite-phishing
Blog

Dynamite Phishing ‒ Emotet can forge e-mails almost perfectly