Crew saves plane and passengers thanks to masterful maneuver off cliff face
Blog

Mayday, mayday! Mastering Cyber Attacks with Cockpit Expertise

respond quickly to cyber incidents thanks to automated cyber defence
Blog

Automation as a Game Changer for your Cyber Defence

illustrated guide for analysing dfir event logs with velociraptor
Blog

CSIRT Insights: Optimisation of Event Log Analysis and Recording in DFIR

Learn how to detect attackers on mobile devices and to secure smartphones and tablets.
Blog

Detecting Attackers on Smartphones and Tablets [Part 2]

Prevention instead of Reaction. How a Compromise Assessment Protects your Data.
Blog

Prevention instead of Reaction: How a Compromise Assessment Protects your Data

Leaked Credentials or how Black Basta attacker penetrate networks.
Blog

Leaked Credentials: How Black Basta attacker penetrate networks

Mobile stalkerware on the rise: how to keep your devices secure? [PART 1]
Blog

Mobile stalkerware on the rise: how to keep your devices secure? [PART 1]

AI against cyber attacks, but not without human expertise
Blog

AI against cyber attacks – not without human expertise

infoguard-alert-cyber-security-ransomware-blog
Blog

AWS ransomware - and what's really behind it

InfoGuard CSIRT: (New) Volume Business: Fully Automated Scan and Reasonable Ransom Amount (InfoGuard Cyber Security Blog)
Blog

(New) Volume Business: Fully Automated Scan and Reasonable Ransom Amount

Netscaler vulnerability exploited by attacker group (InfoGuard Cyber Security Blog)
Blog

InfoGuard CSIRT Warning: Attacker Group Using Netscaler Vulnerability to Steal Credentials

Malware camouflage: threat through manipulated command lines (InfoGuard Cyber Security Blog)
Blog

Malware Cloaking: the Growing Threat of Manipulated Command Lines

InfoGuard Cyber Security CTI Insights: Ransomware writing in the middle of binary numbers
Blog

Cyber Threat Intelligence Insights: Timing of Ransomware Incidents

Artificial Intelligence and Machine Learning: 6 Possible Applications of ChatGPT in Cyber Security and Cyber Defence
Blog

ChatGPT & Co. – the future of cyber security?

InfoGuard Cyber Security Blog: The seven mortal sins - how hackers can easily compromise networks
Blog

The seven mortal sins: how hackers can easily compromise networks

InfoGuard blog post: enhancing security through Cyber Threat Intelligence (CTI)
Blog

Enhancing security through Cyber Threat Intelligence – a review of the CTI year

infoguard-csirt-alert-cyber-security-blog-malvertising
Blog

[Alert] InfoGuard CSIRT issues a “malvertising” warning

infoguard-csirt-alert-cyber-security-blog-malware-raspberry-robin
Blog

[Alert] InfoGuard CSIRT issues a warning about infected flash drives

Blog

Advent, Advent, the school is “burning”! [Part 2]

infoguard-advent-the-school-is-burning-cyber-security
Blog

Advent, Advent, the school is “burning”! [Part 1]

infoguard-zugriffs-auf-authentisierungstokens-von-team-accounts-was-ist-dran
Blog

[Q&A] Access to authentication tokens from Teams accounts – What’s that all about?

infoguard-blog-eröffnung-cdc-en
Blog

Opening of the new InfoGuard Cyber Defence Center for your security – 24/7

infoguard-blog-cyber-resilience-part2-en
Blog

Cyber Resilience: CSIRT insights and emergency plan for top management

infoguard-cyber-security-evuma
Blog

External Vulnerability Management (eVUMA) – not optional, it’s a duty

infoguard-cyber-security-blog-ddos-rekordjahr-2022-en
Blog

Why a new record number of DDoS attacks are predicted in 2022

infoguard-cyber-security-adventskalender-2021-en
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 3]

infoguard-cyber-security-adventskalender-2021-en
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 2]

infoguard-cyber-security-adventskalender
Blog

Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 1]

infoguard-stephan-berger-swiss-cyber-storm-2021-ransomware-part-2
Blog

Ransomware – a Latent Threat [Part 2]

infoguard-ransomware-stephan-berger-swiss-cyber-storm
Blog

Ransomware – a Latent Threat [Part 1]

Blog

Handle security incidents efficiently with Incident Response Triage

infoguard-blog-osterblog
Blog

The Easter Bunny as a Threat Actor – hunting for the tracks left behind

infoguard-cyber-security-blog-ransomware-hacker
Blog

Ransomware attacks becoming more and more professional – and dangerous

infoguard-blog-incident-response-en
Blog

[Video] A cyber thriller in 48 hours

infoguard-blog-incident-response
Blog

Incident response: the police are your friends and helpers

infoguard-blog-adobe-flash-player-en
Blog

The “End-of-Life” for Adobe Flash Player

infoguard-blog-backup-and-recovery
Blog

Why you should be treating your company data as if it were precious crown jewels

infoguard-cyber-security-coronavirus
Blog

Red alert ‒ the hacking trick with Coronavirus

infoguard-cyber-security-blog-incident-response-video
Blog

[Video] Incident Response – the 5 most common mistakes

infoguard-cyber-security-blog-microsoft-rdp
Blog

Microsoft RDP – Another serious security vulnerability

infoguard-cyber-security-blog-emotet-trickbot-ryuk
Blog

Emotet, Trickbot and Ryuk – are these the worst threesome since computer viruses started?

phishing
Blog

Warning ‒ Targeted attacks on Swiss companies

infoguard-cyber-security-blog-fileless-malware
Blog

The fileless malware myth

Blog

What Purple Teaming has in common with “cops and robbers”

Blog

Cyber Defence Center – the SOC of the future