Menu
Offerings
Back
Offerings
Networking
We can help you select, implement, operate, and optimise new technologies into your solution in its entire lifecycle.
Read more
Cybersecurity
We cover all aspects of your environment, from physical security, infrastructure, and applications, to staff security awareness education.
Read more
Data center & cloud
On-prem, private, hyper or multi-cloud? Our data center and cloud experts can work with you to evolve your data center and operations into a flexible and risk-proof IT environment.
Read more
Solutions
Back
Solutions
Networking
Today, the network touches everything in any company. This makes it an ideal platform for improving security and business efficiency.
Read more
Network Automation
Automate manual tasks, and your ICT will be more agile, faster, and flexible. Achieved with lower operational costs and fewer resources.
Read more
Local Area Network
Remote workplaces add more requirements to the local network and make it your company’s heart.
Read more
Wireless network
We have a long track record of implementing indoor and outdoor wireless networks in all industries.
Read more
WAN and Service provider networks
When your network is serving large companies, and their customers, requirements are equally big.
Read more
Cybersecurity
Cyber Security is not only about avoiding risk. A proper security setup also helps your business stay ahead.
Read more
Network Security
Networks are one of the best battlegrounds to stop, contain, or detect attacks.
Read more
Endpoint Protection
Protecting your endpoint devices from cyber threats is vital to prevent and limit damage to your business.
Read more
Conscia Maturity Assessment
Conscia’s Maturity Assessment is a full-service package that provides you with tailored insights and actionable recommendations.
Read more
Conscia ThreatInsights
Get weekly updates about incidents, exploits, malware, and other cybersecurity relevant information from our Threat Intelligence and Reverse Engineering experts.
Read more
Data Center & Cloud
For organisations aiming to stay ahead, choosing the right Data Center and Multicloud solutions is crucial.
Read more
Public, Private and Hybrid Cloud
Increase flexibility with public, private and hybrid cloud solutions.
Read more
Software-defined Network (SDN) for data centers
Build a more secure, more manageable and better-performing network.
Read more
Server
It used to be all about capacity and performance, but today organisations should demand more from their server platforms.
Read more
Storage
From traditional disc storage to server-based storage and cloud storage: The options in the area are plenty.
Read more
Digital Workspace
In the age of mobility and cloud, information has become available to employees from any device and any place.
Read more
Services
Back
Services
Managed Services
Simple, Flexible, and Scalable Services that support your legacy infrastructure.
Read more
Managed Network Services
Our Network Operations Center (NOC) monitors complex networks, detects faults, solve problems immediately, and more.
Read more
Managed Security Services
Advanced managed detection and response services, provided by a Security Operations Center (SOC), enable you to minimize risks and costs by detecting IT security threats at an early stage
Read more
Managed Datacenter & Cloud services
Let us manage the operation of your Cloud platform. Our certified consultants are ready with on-call 24-hour support – all year round.
Read more
Service & Support
Secure immediate access to highly qualified help in case of incidents and support the preparation of a long-term plan for managing network devices.
Read more
Conscia Care
Conscia Care is the cornerstone and foundation for stable operations.
Read more
Expertise Consultancy
Get access to operational consultants with long experience and heavy competencies within network infrastructure.
Read more
Conscia Network Services (CNS)
Our award-winning Customer Service Platform, we offer automated asset management for even the most complex infrastructures.
Read more
Conscia Education services
Upskill your employees in the latest Cisco technologies to ensure you deliver on your promises.
Read more
Industry cases
Careers
About us
Back
About us
About Conscia
Read more
Conscia Leadership
Read more
Partners & Awards
Read more
Sustainability
Read more
Pressroom
Read more
News
Login
Login to CNS
Search for:
Choose your local market:
Go to
Global
Global/English
Denmark/Danish
Germany/German
Ireland/English
Netherlands/Dutch
Norway/Norwegian
Slovenia/Slovene
Sweden/Swedish
UK/English
Belgium/Dutch
Go to
Global/English
Denmark/Danish
Germany/German
Ireland/English
Netherlands/Dutch
Norway/Norwegian
Slovenia/Slovene
Sweden/Swedish
UK/English
Belgium/Dutch
Search for:
Search
Login
Login to CNS
Contact
Get the
latest insights
in our blog, written by
our own experts
.
Home
»
Blog
Show all
Cases
Events
Blogs
Recorded webinars
Guides
Press releases
Whitepapers
Show Filters
Industries
All
Education
Energy/Utilities
Local Government / Municipalities
Solutions & Services
AI
Analytics
Automation
Cloud
Compliance
Conscia Service Portal
Cybersecurity
Data Center
Internet of Things (IoT)
Lifecycle Advisory
Managed Services
Mobility
Networking
NIS2
Observability
SASE
sd-wan
Services
SOC
Software
Threat Intelligence
Unified Communication
Wireless
Business outcome
Cost Predictability
Digital Transformation
Governance, Risk & Compliance
Managed Detection & Response
Operational Efficiency
Security Operations
David Kasabji
Principal Threat Intelligence Analyst
Blog
The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes
9. January 2024
GitHub, a key coding platform, faces rising cyber threats. This blog post explores its exploitation and outlines effective cybersecurity strategies for mitigation.
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity
19. December 2023
In cybersecurity, an unexpected one-time passcode (OTP) signals a security threat - possible credential theft. Learn more about...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Deep Dive into the May 2023 Cyber Attack on Danish Energy Infrastructure
15. November 2023
Danish energy infrastructure endured a sophisticated cyber attack, signifying a major escalation. This post analyzes the unprecedented assault,...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
What can we learn from recent Okta breaches?
8. November 2023
Okta, a major identity and access management player, faced two major security breaches. Examining these incidents provides crucial...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
New Critical Vulnerability in Cisco IOS XE Software Poses Cybersecurity Concerns
17. October 2023
Edit note, October 24: Added a section regarding updates to include additional Indicators of Compromise (IOCs) and methods...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data
11. October 2023
Enumeration attacks, especially banking identification number (BIN) generation attacks, enable threat actors to produce and validate payment card...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Adversary-In-The-Middle Attack: A novel way to evade MFA
3. October 2023
In the vast realm of cyber threats, a relatively newer but impactful method has emerged: Adversary In the...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
How Cybercriminals Exploit Legitimate Internet Services for Malicious Purposes
27. September 2023
Cybercriminals increasingly manipulate reputable platforms such as Google Drive, OneDrive, Notion, and GitHub to camouflage their malicious activities...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Defending Against Infostealer Malware Attacks: A Comprehensive Guide for Organizations
19. September 2023
In today’s digital age, information is power. As organizations increasingly rely on digital data, the allure for cybercriminals...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Cloud Storage Risk Assessment: Our privacy rests… at risk?
13. September 2023
Cloud storage and hosting have become a common way of storing your and your organization’s sensitive data in...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Understanding Vulnerability Lifecycle to Better Combat Exploits
6. September 2023
If you care about cybersecurity, you surely have heard the term ‘software vulnerability.’ But it can quickly happen...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
CL0P Group – Analysis of European’s rising ransomware threat
6. September 2023
If you were following trends in the cyber threat landscape for the past few months, or actually the...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Danish cloud-hosting provider hit by devastating ransomware attack.
30. August 2023
Danish cloud-hosting company were hit by ransomware attacks, resulting in significant customer data loss and system shutdowns.
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
A look into Living off the Land adversarial technique
30. August 2023
Recently, you may have noticed several cybersecurity news sites citing Microsoft’s article on Flax Typhoon’s (threat actors) stealthiness while performing...
Read more
Anders Pedersen
Cloud Solution Architect, Conscia Denmark
Blog
Can Prisma Cloud provide API security for your cloud?
15. March 2023
Spoiler alert: it probably can (your mileage may vary), but your cloud architecture determines whether it is the...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
How could AI simplify malware attacks, and why is this worrying?
24. February 2023
AI can significantly reduce Malware development and distribution costs, giving cybercriminals an advantage over insufficiently secured targets. Read...
Read more
Jure Planinšek
Head of Compliance and Legal, NIL - Part of Conscia
Blog
Diligent Management and Cybersecurity
20. February 2023
In business, cyber-attacks have become a part of reality and are no longer something that happens “out there”....
Read more
Matevž Mesojednik
Security Operations Center (SOC) Manager, NIL
Blog
Three lessons for better cybersecurity in 2023
2. January 2023
From the point of view of Conscia’s Security Operations Center (SOC), the year 2022 confirmed the fact that...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Digital Forensics: Discovering Threat Actor’s traces using Recycle Bin
6. December 2022
Criminals don’t like to leave traces. In the cyber world, that means deleting their malicious software from your...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Season’s Greetings from Cybercriminals
25. November 2022
Cybercrime is on the rise during the holiday season. Cybercriminals take advantage of Black Friday, Cyber Monday, and...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Phishing as a Service (PHaaS) – an effective attack vector for all threat actors
17. November 2022
Phishing has professionalized. It is literally available to criminals in a »as a service« model, and the most...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
New 0-day vulnerabilities in Microsoft Exchange Server actively exploited
30. September 2022
Two reported 0-day vulnerabilities affecting Microsoft Exchange Server 2013, 2016, and 2019 (on-prem) tracked as CVE-2022-41040 and CVE-2022-41082...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Insider Threats: What are they and how to mitigate them
20. September 2022
While often neglected, an organization’s own personnel pose one of the biggest threats to its security. Human error...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Diving Deep: How to detect Malware Persistency pt. 1
3. August 2022
During a cyber-attack adversaries might gain access to an environment through a certain system, but that might not...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Diving Deep: How to detect Typosquatting
21. June 2022
Typosquatting is a type of social engineering attack where a threat actor registers domains with deliberately misspelled names...
Read more
Tom Kern
Senior Cyber Security Analyst and Researcher
David Kasabji
Principal Threat Intelligence Analyst
Blog
Vulnerability Spotlight: How to detect Follina the Windows MSDT 0-day
1. June 2022
Microsoft confirmed a security vulnerability tracked as CVE-2022-30190 and released it on their MSRC portal on May 30th,...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Diving Deep: Malware Injection Techniques – Part 1
31. May 2022
Malware Injection Techniques This is the first entry in the Malware Injection Techniques article series that we will...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Ransomware-as-a-Service: An infamously lucrative business model
18. May 2022
Ransomware as a type of malware is not a 21st century invention. We can trace it back to...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Conti Ransomware Gang falls apart
1. May 2022
Conti ransomware gang was infamously known as one of the most sophisticated adopters of ransomware-as-a-service (RaaS) model, earning...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Increased threat against industries leveraging ICS and SCADA devices
14. April 2022
US agencies (CISA, NSA, FBI) and Department of Energy issued a new Cybersecurity Advisory (CSA) warning on 13.04.2022...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
What you need to know about the increased Digital Risks following the cyber-attacks on Ukraine
16. March 2022
Amidst the ongoing warfare, we were able to track the development of new dedicated and tailored malware (HermeticWiper...
Read more
Jesper Erbs
System Engineer
Blog
Critical Vulnerability in Apache Log4j
13. December 2021
A critical vulnerability has been discovered in Apache Log4j (CVE-2021-22448), which has a maximum CVSS score of 10....
Read more
Daniel Bo Sindersen
Security Analyst
Henrik Skovfoged
Blog
Is your Active Directory secure?
1. September 2021
How do you discover and assess misconfigurations and newly discovered vulnerabilities in your most critical asset – Active...
Read more
Henrik Skovfoged
Blog
CIS Controls version 8
15. June 2021
Center for Internet Security (CIS) has recently updated the CIS controls (May 2021) and we no longer have...
Read more
Henrik Skovfoged
Blog
Where and how to begin the cyber security journey?
18. May 2021
Where to start? Many European organizations struggle to start the cyber security journey. Most of the organizations know...
Read more
Emanuel Lipschütz
CCIE
Blog
Major security mistake costs businesses millions
17. May 2021
Cybersecurity is on the board agenda for all companies or should at least be there. Everyone understands the...
Read more
Emanuel Lipschütz
CCIE
Blog
Cutting corners in cyber security will backfire
12. May 2021
Managers at manufacturing companies experience how IT, digitalization, call it what you want, washes over them at an...
Read more
«
1
2
3
»
Contact
Contact us now