Menu
Offerings
Back
Offerings
Networking
We can help you select, implement, operate, and optimise new technologies into your solution in its entire lifecycle.
Read more
Cybersecurity
We cover all aspects of your environment, from physical security, infrastructure, and applications, to staff security awareness education.
Read more
Data center & cloud
On-prem, private, hyper or multi-cloud? Our data center and cloud experts can work with you to evolve your data center and operations into a flexible and risk-proof IT environment.
Read more
Solutions
Back
Solutions
Networking
Today, the network touches everything in any company. This makes it an ideal platform for improving security and business efficiency.
Read more
Network Automation
Automate manual tasks, and your ICT will be more agile, faster, and flexible. Achieved with lower operational costs and fewer resources.
Read more
Local Area Network
Remote workplaces add more requirements to the local network and make it your company’s heart.
Read more
Wireless network
We have a long track record of implementing indoor and outdoor wireless networks in all industries.
Read more
WAN and Service provider networks
When your network is serving large companies, and their customers, requirements are equally big.
Read more
Conscia PowerSave
By automatically disabling wireless networks when not in use, Conscia PowerSave helps to reduce energy consumption, carbon footprint, and costs.
Read more
Cybersecurity
Cyber Security is not only about avoiding risk. A proper security setup also helps your business stay ahead.
Read more
Network Security
Networks are one of the best battlegrounds to stop, contain, or detect attacks.
Read more
Endpoint Protection
Protecting your endpoint devices from cyber threats is vital to prevent and limit damage to your business.
Read more
Conscia Maturity Assessment
Conscia’s Maturity Assessment is a full-service package that provides you with tailored insights and actionable recommendations.
Read more
Conscia ThreatInsights
Get weekly updates about incidents, exploits, malware, and other cybersecurity relevant information from our Threat Intelligence and Reverse Engineering experts.
Read more
Data Center & Cloud
For organisations aiming to stay ahead, choosing the right Data Center and Multicloud solutions is crucial.
Read more
Public, Private and Hybrid Cloud
Increase flexibility with public, private and hybrid cloud solutions.
Read more
Software-defined Network (SDN) for data centers
Build a more secure, more manageable and better-performing network.
Read more
Server
It used to be all about capacity and performance, but today organisations should demand more from their server platforms.
Read more
Storage
From traditional disc storage to server-based storage and cloud storage: The options in the area are plenty.
Read more
Digital Workspace
In the age of mobility and cloud, information has become available to employees from any device and any place.
Read more
Services
Back
Services
Managed Services
Simple, Flexible, and Scalable Services that support your legacy infrastructure.
Read more
Managed Network Services
Our Network Operations Center (NOC) monitors complex networks, detects faults, solve problems immediately, and more.
Read more
Managed Security Services
Advanced managed detection and response services, provided by a Security Operations Center (SOC), enable you to minimize risks and costs by detecting IT security threats at an early stage
Read more
Managed Datacenter & Cloud services
Let us manage the operation of your Cloud platform. Our certified consultants are ready with on-call 24-hour support – all year round.
Read more
Service & Support
Secure immediate access to highly qualified help in case of incidents and support the preparation of a long-term plan for managing network devices.
Read more
Conscia Care
Conscia Care is the cornerstone and foundation for stable operations.
Read more
Expertise Consultancy
Get access to operational consultants with long experience and heavy competencies within network infrastructure.
Read more
Conscia Network Services (CNS)
Our award-winning Customer Service Platform, we offer automated asset management for even the most complex infrastructures.
Read more
Conscia Education services
Upskill your employees in the latest Cisco technologies to ensure you deliver on your promises.
Read more
Industry cases
Careers
About us
Back
About us
About Conscia
Read more
Conscia Leadership
Read more
Partners & Awards
Read more
Sustainability
Read more
Pressroom
Read more
News
Login
Login to CNS
Search for:
Choose your local market:
Go to
Global
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Slovenia/Slovene
Sweden/Swedish
UK/English
Go to
Global/English
Denmark/Danish
Germany/German
Netherlands/Dutch
Norway/Norwegian
Slovenia/Slovene
Sweden/Swedish
UK/English
Search for:
Search
Login
Login to CNS
Contact
Get the
latest insights
in our blog, written by
our own experts
.
Home
»
Threat Intelligence
Show all
Cases
Events
Blogs
Recorded webinars
Guides
News
Press releases
Whitepapers
Show Filters
Industries
All
Education
Energy/Utilities
Local Government / Municipalities
Solutions & Services
AI
Analytics
Automation
Cloud
Compliance
Conscia Service Portal
Cybersecurity
Cybersecurity Month
Data Center
Internet of Things (IoT)
Lifecycle Advisory
Managed Services
Mobility
Networking
NIS2
Observability
SASE
sd-wan
Services
SOC
Software
Threat Intelligence
Unified Communication
Wireless
Business outcome
Cost Predictability
Digital Transformation
Governance, Risk & Compliance
Managed Detection & Response
Operational Efficiency
Security Operations
David Kasabji
Principal Threat Intelligence Analyst
Blog
Protecting Your Business from Supply-Chain Attacks: What to Do When Third Parties Are Breached
16. October 2024
Breaches at third-party vendors can expose data and disrupt operations, posing significant risks to the partnering company. Learn how to handle a breach effectively.
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Exploring the Dark Side of Generative AI: The Rise of Cyber Threats in the Digital Age
13. March 2024
When we think about predicting cyber threats that will reign in the coming year, we often lean back...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
OpenAI Sora – Cybersecurity Threat or Opportunity?
4. March 2024
OpenAI's Sora: Is it a threat or an opportunity? We look at its groundbreaking text-to-video capabilities and how...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
The Stealthy Cyber Threat: Abuse of GitHub for Malicious Purposes
9. January 2024
GitHub, a key coding platform, faces rising cyber threats. This blog post explores its exploitation and outlines effective...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Understanding the Risks of Unprompted One-Time Passcodes in Cybersecurity
19. December 2023
In cybersecurity, an unexpected one-time passcode (OTP) signals a security threat - possible credential theft. Learn more about...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Deep Dive into the May 2023 Cyber Attack on Danish Energy Infrastructure
15. November 2023
Danish energy infrastructure endured a sophisticated cyber attack, signifying a major escalation. This post analyzes the unprecedented assault,...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
What can we learn from recent Okta breaches?
8. November 2023
Okta, a major identity and access management player, faced two major security breaches. Examining these incidents provides crucial...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
New Critical Vulnerability in Cisco IOS XE Software Poses Cybersecurity Concerns
17. October 2023
Edit note, October 24: Added a section regarding updates to include additional Indicators of Compromise (IOCs) and methods...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Enumeration Attacks: A Deep Dive into Threat Actors Generating Valid Payment Data
11. October 2023
Enumeration attacks, especially banking identification number (BIN) generation attacks, enable threat actors to produce and validate payment card...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Adversary-In-The-Middle Attack: A novel way to evade MFA
3. October 2023
In the vast realm of cyber threats, a relatively newer but impactful method has emerged: Adversary In the...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
How Cybercriminals Exploit Legitimate Internet Services for Malicious Purposes
27. September 2023
Cybercriminals increasingly manipulate reputable platforms such as Google Drive, OneDrive, Notion, and GitHub to camouflage their malicious activities...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Defending Against Infostealer Malware Attacks: A Comprehensive Guide for Organizations
19. September 2023
In today’s digital age, information is power. As organizations increasingly rely on digital data, the allure for cybercriminals...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Cloud Storage Risk Assessment: Our privacy rests… at risk?
13. September 2023
Cloud storage and hosting have become a common way of storing your and your organization’s sensitive data in...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Understanding Vulnerability Lifecycle to Better Combat Exploits
6. September 2023
If you care about cybersecurity, you surely have heard the term ‘software vulnerability.’ But it can quickly happen...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
CL0P Group – Analysis of European’s rising ransomware threat
6. September 2023
If you were following trends in the cyber threat landscape for the past few months, or actually the...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Danish cloud-hosting provider hit by devastating ransomware attack.
30. August 2023
Danish cloud-hosting company were hit by ransomware attacks, resulting in significant customer data loss and system shutdowns.
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
A look into Living off the Land adversarial technique
30. August 2023
Recently, you may have noticed several cybersecurity news sites citing Microsoft’s article on Flax Typhoon’s (threat actors) stealthiness while performing...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
How could AI simplify malware attacks, and why is this worrying?
24. February 2023
AI can significantly reduce Malware development and distribution costs, giving cybercriminals an advantage over insufficiently secured targets. Read...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Digital Forensics: Discovering Threat Actor’s traces using Recycle Bin
6. December 2022
Criminals don’t like to leave traces. In the cyber world, that means deleting their malicious software from your...
Read more
David Kasabji
Principal Threat Intelligence Analyst
Blog
Season’s Greetings from Cybercriminals
25. November 2022
Cybercrime is on the rise during the holiday season. Cybercriminals take advantage of Black Friday, Cyber Monday, and...
Read more
1
2
»
Contact
Contact us now