Blog

Filter: Florian Roth - Clear Filter

THOR Util Replaces THOR-Upgrade

We are currently upgrading our update infrastructure in many different ways. We have added 2 new dedicated update servers - update1 (Karlsruhe, Germany) and update2 (Lenexa, USA). The old update locations will still be supported for a few months but have to be...

read more

ASGARD Management Center version 1.4

Release notification of the ASGARD Management Center version 1.4 We have release version 1.4 for ASGARD. This version has major improvements in usability, flexibility, stability and performance. Plan and run THOR and SPARK scans on up to 10.000 endpoints – with a...

read more

New Antivirus Event Analysis Cheat Sheet Version 1.2

Today we release a new version of our "Antivirus Event Analysis" Cheat Sheet that helps you with the analysis of Antivirus events by providing a clear decision matrix. We've updated many of the sections, added new VirusTotal online analysis checks and brought it in a...

read more

New THOR / SPARK License Packs

We have just recently released new, flexible and practice-oriented license packs for our scanners THOR and SPARK. These license packs will help you to get started as quickly as possible in case of an incident response, digital forensics engagement or compromise...

read more

How to Write Sigma Rules

Sigma is an open standard for rules that allow you to describe searches on log data in generic form. These rules can be converted and applied to many log management or SIEM systems and can even be used with grep on the command line. In this article I'd like to give...

read more

Welcome to Our New Website

We welcome you to our new website and encourage you to review our 'products' and 'services' sections. From now on we will publish news about our products, articles about incident response, YARA rules, detection methods, IOCs and other interesting topics on this blog...

read more

The Best Possible Monitoring with Sigma Rules

Some of you may already have heard of Sigma, a generic approach for signatures used in SIEM systems. Its main purpose is to provide a structured form in which researchers or analysts can describe their once developed detection methods and make them shareable with...

read more

Not All IOC Scanning Is the Same

In the recent months I had several talks with friends and coworkers about IOC scanning and how to integrate IOCs from threat intel feeds into our scanners or other products that our customers already use. People often tell me that EDR or client management product X...

read more

How to Fall Victim to Advanced Persistent Threats

During the last four years, I was engaged on incident response teams for several large advanced persistent threat (APT) cases involving different German corporations. In this time, we have developed methods and tools to detect compromised systems, while also planning...

read more