First encrypt, then blackmail

Encryption_Ransomware
Cyber attacks on organizations can be categorized into four different groups. Ivan Bütler tells at Zürichsee-Zeitung what these are.

 

The Zürichsee-Zeitung interviewed Gregor Seiler, he is encryption expert at IBM in Rüschlikon and is researching in quantum computers.

In keeping with this topic, Compass co-founder Ivan Bütler lists the four main intentions of cyber attacks on networks.

 

You can download the two articles (in German) as PDF files here:

CALENDAR

Security Training: Social Engineering

In the 2-day course (in German) from June 9/10, 2020, you will get to know and understand the methods, tools and tricks of social engineering. Read more

it-sa 2020

Europas führende Fachmesse für IT-Sicherheit findet vom 06. - bis 08. Oktober 2020 im Messezentrum Nürnberg (DE) statt. Reservieren Sie bereits heute... Read more

ALL DATES

Compass Security Blog

Relaying NTLM authentication over RPC

Since a few years, we - as pentesters - (and probably bad guys as well) make use of NTLM relaying a lot for privilege escalation in Windows networks. In this article, we propose adding support for... mehr

Reversing a .NET Orcus dropper

In this blog post we will reverse engineer a sample which acts as downloader for malware (aka a “dropper”). It is not uncommon to find such a downloader during DFIR engagements so we decided to take a... mehr

ZUM BLOG