Feb. 9, 2024, 12:04 p.m. | Sai Prashanth Pulisetti

System Weakness - Medium systemweakness.com

Anydesk logo

Introduction

In the world of cybersecurity, contributions come in various forms. One such contribution is the creation of rules that enhance the security of applications. This blog post discusses a pull request made to SigmaHQ that added a new rule to detect the execution of the AnyDesk application signed with a known compromised certificate.

The Importance of the Rule

The importance of this rule is underscored by a recent security incident involving AnyDesk. A security audit revealed evidence …

anydesk cyber security awareness information security security-operation-center threat hunting

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC