Our offerings
SOC Services
Managed Detection and Response
SOC Escalation
SIEM Acceleration
XDR Acceleration
Digital Risk Protection
Anti-phishing
Threat Monitors
Consulting
AD Security Assessment
Compromise assessment
Assume Breach
Cloud Security Assessment
Emergency Response Services
Emergency Response Consulting
Emergency Response Retainers
Cyber Threat Intelligence
Cyber Defence Feed
Threat Insights
Threat Cloud
SPECIALIZED SERVICES
NIS2
OT CYBERSECURITY SERVICES
Contact Sales
Newsletter
Your challenges
Resources
About us
What's new
Our Story
Our Team
Our Values
Our Impact & ESG
Our certifications
Our memberships
Our partnerships
Contact
Press
Cyberhagen
Careers
Our offerings
SOC Services
Managed Detection and Response
SOC Escalation
SIEM Acceleration
XDR Acceleration
Digital Risk Protection
Anti-phishing
Threat Monitors
Consulting
AD Security Assessment
Compromise assessment
Assume Breach
Cloud Security Assessment
Emergency Response Services
Emergency Response Consulting
Emergency Response Retainers
Cyber Threat Intelligence
Cyber Defence Feed
Threat Insights
Threat Cloud
SPECIALIZED SERVICES
NIS2
OT CYBERSECURITY SERVICES
Your challenges
Resources
About us
What's new
Our Story
Our Team
Our Values
Our Impact & ESG
Our certifications
Our memberships
Our partnerships
Contact
Press
Cyberhagen
Careers
Portal Log in
Talk to Us!
Our offerings
SOC Services
Managed Detection and Response
SOC Escalation
SIEM Acceleration
XDR Acceleration
Digital Risk Protection
Anti-phishing
Threat Monitors
Consulting
AD Security Assessment
Compromise assessment
Assume Breach
Cloud Security Assessment
Emergency Response Services
Emergency Response Consulting
Emergency Response Retainers
Cyber Threat Intelligence
Cyber Defence Feed
Threat Insights
Threat Cloud
SPECIALIZED SERVICES
NIS2
OT CYBERSECURITY SERVICES
Contact Sales
Newsletter
Your challenges
Resources
About us
What's new
Our Story
Our Team
Our Values
Our Impact & ESG
Our certifications
Our memberships
Our partnerships
Contact
Press
Cyberhagen
Careers
Our offerings
SOC Services
Managed Detection and Response
SOC Escalation
SIEM Acceleration
XDR Acceleration
Digital Risk Protection
Anti-phishing
Threat Monitors
Consulting
AD Security Assessment
Compromise assessment
Assume Breach
Cloud Security Assessment
Emergency Response Services
Emergency Response Consulting
Emergency Response Retainers
Cyber Threat Intelligence
Cyber Defence Feed
Threat Insights
Threat Cloud
SPECIALIZED SERVICES
NIS2
OT CYBERSECURITY SERVICES
Your challenges
Resources
About us
What's new
Our Story
Our Team
Our Values
Our Impact & ESG
Our certifications
Our memberships
Our partnerships
Contact
Press
Cyberhagen
Careers
CSIS Portal
Under Attack?
CSIS Tech Blog
Sharing our latest cybersecurity research and insights.
All
Tech Blog
04.04.2024
CSIS RESEARCH - Acrobat Reader Connector Icons
Acrobat Reader Connector Icons Leveraging Acrobat Reader’s thumbnail cache during DFIR Dénes Olivér Óvári, Detection...
18.12.2023
CSIS RESEARCH - Credential Misuse & Identity Theft
Credential Misuse & Identity Theft Credential Misuse and Identity-Based Attack Vectors Dénes Olivér Óvári, Detection...
09.11.2023
CSIS RESEARCH - Windows Covert Compilers III
Windows Covert Compilers III. DFIR ARTIFACTS Dénes Olivér Óvári, Detection and Response Architect CSIS Security Group...
07.11.2023
CSIS RESEARCH - Windows Covert Compilers II
Windows Covert Compilers II. UNDER THE HOOD Dénes Olivér Óvári, Detection and Response Architect CSIS Security Group A/S
01.11.2023
CSIS RESEARCH - Windows Covert Compilers I
Windows Covert Compilers I. C#, Visual Basic and JScript – all within PowerShell Dénes Olivér Óvári, Detection and...
17.10.2023
CSIS RESEARCH - Weakness in Microsoft Defender for Endpoint identified
Introduction
Subscribe to our latest news
Don’t miss out
on our news