Feb. 9, 2024, 12:04 p.m. | Sai Prashanth Pulisetti

System Weakness - Medium systemweakness.com

Anydesk logo

Introduction

In the world of cybersecurity, contributions come in various forms. One such contribution is the creation of rules that enhance the security of applications. This blog post discusses a pull request made to SigmaHQ that added a new rule to detect the execution of the AnyDesk application signed with a known compromised certificate.

The Importance of the Rule

The importance of this rule is underscored by a recent security incident involving AnyDesk. A security audit revealed evidence …

anydesk cyber security awareness information security security-operation-center threat hunting

Senior Security Officer

@ eSimplicity | Remote

Senior - Automated Cyber Attack Engineer

@ Deloitte | Madrid, España

Public Key Infrastructure (PKI) Senior Engineer

@ Sherwin-Williams | Cleveland, OH, United States

Consultant, Technology Consulting, Cyber Security - Privacy (Senior) (Multiple Positions) (1502793)

@ EY | Chicago, IL, US, 60606

Principal Associate, CSOC Analyst

@ Capital One | McLean, VA

Real Estate Portfolio & Corporate Security Lead

@ Lilium | Munich