-
02.6.2022
How to detect Follina the Windows MSDT 0-day
Author: David Kasabji, Tom Kern
Microsoft confirmed a security vulnerability tracked as CVE-2022-30190 and released it on their MSRC portal on May 30th, 2022. The vulnerability allows for a remote code execution (RCE) when MSDT (Microsoft Support Diagnostic Tool) is called using URL protocol from a calling application.
-
10.5.2022
Dissecting Russian State-sponsored Threat Actors
Author: David Kasabji
Who are the Russian-state sponsored hackers that fight in cyber-war in Ukraine, what techniques are they using and how (if) you should prepare your cyber-defenses for these attacks and threats?
-
21.2.2022
Visit of a Security Operations Center (SOC)
Author: Jakob Premrn
In this podcast, we discussed what SOC actually stands for, described major roles in the SOC team, and provided some insights into the day of a cyber specialist in NIL`s SOC.
-
24.1.2022
How to evaluate the credibility and quality of a SOC
Author: Matevž Mesojednik
Choosing a MDR service provider is very important, yet tricky task. In the podcast, we discussed some of the essential criteria for evaluating the quality and credibility of MDR providers.
-
21.12.2021
Log4j - one week in
Author: Jan Bervar
What you need to know now about Log4j and how to be better prepared for the similar threats in the future.
-
20.10.2021
What to do and what not to do when you are under a cyber attack?
Tackling cyber-attacks “ad-hoc” with no adequate knowledge of how to respond to an incident is never a good reaction. So what should you do when you are under a cyber attack?
-
19.10.2021
Understanding the Importance of First Steps After a Ransomware Attack
Author: Suzana Kužnik
Dos and don'ts of a ransomware incident response. Or what to do and what not to do when you are under a ransomware attack.
-
06.10.2021
How to be secure from Ransomware?
Author: Jakob Premrn
Jakob Premrn, cybersecurity expert at NIL, part of Conscia Group, explains what is Ransomware, why is it so profitable and how to defend against it.
-
04.10.2021
How to Stop Ransomware?
Author: Jakob Premrn
Ransomware attacks are probably the best proof that cyber crime works and is very profitable. Extortion payments have hit new records with an average of $570,000 in the first half of 2021. Why are ransomware attacks so common, “successful”, and how to protect yourself against them?
-
13.8.2021
How to fight against cyber attacks?
If you have been feeling depressed about the Covid-19 crisis lately, we’ve got the news for you – cybercrime represents a similar threat to the modern civilization in a digital world as Covid-19 does to our health. It seems, we don't have any long-term answers to either of these challenges. How to fight against cyber attacks?
-
11.6.2021
Reliable energy in time of evolving cyber threats
Heavily relying on IT and OT digital platforms, Centrica’s business critically depends 24/7 on their integrity and availability. Conscia managed SOC services are a core pillar in providing this assurance.
-
26.3.2021
Data Abundance
Author: Suzana Kužnik
According to the famous saying “Less is More,” at our SOC, we strive to monitor and filter enormous amounts of data in a smart way, so that we can spot any suspicious data which could indicate danger. But how do our cybersecurity analysts manage that?
-
29.1.2021
Cybersecurity Diagnostics: Machine versus Human
Author: Jakob Premrn
Without ML and AI, data cannot be analyzed and understood, but on the other hand we cannot decide if the detected actions are malicious, what is going to be the next step of the threat actor, and how to block access of an adversary to your network without human interaction.
-
19.12.2020
Firefighting Cyberattacks
Author: Matevž Mesojednik
Why is fighting cyber crime not about new technologies, but about new approaches.
-
07.12.2020
With Cautious Optimism on the Road to Digital Immunity
Author: Stojan Rančić
From the cyber-risk management perspective, the combination of the lack of staff, technical debt, and current COVID-19-related difficulties poses quite a challenge. Learn how to strengthen digital immune system of your IT environment and improve its cyber resilience.
-
23.11.2020
(Un)Secure Microsoft Windows for Free
Author: Jakob Premrn
Microsoft security solutions are part of all modern Microsoft Windows operating systems and offer a great deal of protection if they are configured correctly. Learn how you can create a secure environment using only the correctly-configured free and built-in Microsoft solutions.
-
19.10.2020
What is a Threat Detection Framework?
Author: Tom Kern
In today’s world of increasing complexity and lucrative cybercrime industry, you can only be certain of one thing: you will be hacked – and your exposure is growing. Discover the framework and approaches to protect your business against cyber threats – even in today’s world.
-
15.10.2020
The advantages of cloud-based SIEM and Azure Sentinel
Author: Jan Češčut, Jakob Premrn
Standard SIEM solutions are relatively expensive, demanding to maintain, and rigid. The cloud-based SIEM systems can successfully solve these problems, while also bringing along many more functions. This webinar talks about Azure Sentinel, cloud-based SIEM by Microsoft, and its key advantages and properties. You will also see how Azure Sentinel works in a demo attack.
-
22.6.2020
Banks that take cybersecurity seriously use a SOC
Delavska hranilnica savings bank is pursuing a strategic approach to cybersecurity in its continuing push to go digital and offer advanced digital products. This makes it crucial to effectively detect and respond to potential cyber threats, a feat made possible by the NIL Security Operations Centre (SOC), which is considered by the bank as the most comprehensive SOC service on the market.
-
22.4.2020
Is your cyber defense strategy a waste of money?
Author: Jan Bervar
On average, businesses need around 200 days to notice that they have been breached. An average security incident costs companies around 3 million euros or more, even with smaller organizations. Why is it like this and how to improve these worrying numbers?
-
07.4.2020
Stopping cybercrime from stopping business
Author: Jan Bervar
Today, a sufficient cybercrime defence must include incident detection and response capabilities, along with investments in increasing security maturity. But, how to enable that? How to provide immediate response to digital attacks? Find answers in our new white paper!
-
11.3.2020
WannaTry again? SMBv3 Vulnerability Awakes!
Author: David Kasabji, Boštjan Žvanut
The SMBv3 vulnerability (CVE-2020-0796) - LEAKED TODAY - affects almost all the new Windows systems. It does not have a patch yet, so our SOC team wrote some guidelines for minimizing the risk and protecting your business against a potential zero-day exploit.
-
13.2.2020
Microsoft Managed Security Services
Author: Eugen Rusen
Envisioning workshop for Managed Security as a Service that empowers organizations on their Cloud and Zero Trust journeys.
-
31.1.2020
SOC Orchestra: The symphony of security tools
Author: David Kasabji
Learn wow we leverage automation and orchestration in our SOC to work significantly more efficiently, without reducing the quality of our services.