Blog

Filter: Newsletter - Clear Filter

New rules of the game in the fight against cybercrime

New rules of the game in the fight against cybercrime

Dietzenbach, 13.02.2024 - Nextron Systems, a leading provider of innovative IT security solutions, continues its pioneering mission to combat and detect cybercrime at an early stage. As an emerging industry thought leader, Nextron is taking decisive action to protect...

read more
End-of-Life ASGARD Analysis Cockpit Version 3

End-of-Life ASGARD Analysis Cockpit Version 3

Nextron announces the end-of-sale and end-of-life dates for the ASGARD Analysis Cockpit version 3. Customers with active service contracts will continue to receive support until September 30, 2024, as shown in the table below. End of Life Announcement Date The date...

read more
Announcing the Launch of Analysis Cockpit v4.0

Announcing the Launch of Analysis Cockpit v4.0

We are pleased to announce the release of Analysis Cockpit v4.0, marking a significant update from version 3.10. This latest version introduces key improvements, including restructured database indices for enhanced performance, an upgraded operating system, and...

read more
Introducing the Nextron Community Discord Server

Introducing the Nextron Community Discord Server

We are pleased to announce the launch of the Nextron Community Discord Server, a dedicated space for technical dialogue and support for Nextron's range of products. This server aims to facilitate a deeper understanding and more effective use of our solutions.Key...

read more

New THOR 10.7.8 TechPreview Features

We are thrilled to unveil THOR 10.7.8, the latest version of our advanced persistent threat (APT) scanner, which brings a host of powerful features to enhance threat detection and analysis. In this blog post, we will highlight some of the notable additions that make...

read more
Customer Portal Upgrade – Planned Downtime

Customer Portal Upgrade – Planned Downtime

We would like to inform you that our customer portal will be undergoing a scheduled maintenance and will be temporarily unavailable on Wednesday, April 12, 2023, between 10:00am and 11:00am CEST. We apologize for any inconvenience this may cause. During this downtime,...

read more
Demystifying SIGMA Log Sources

Demystifying SIGMA Log Sources

One of the main goals of Sigma as a project and Sigma rules specifically has always been to reduce the gap that existed in the detection rules space. As maintainers of the Sigma rule repository we're always striving for reducing that gap and making robust and...

read more
THOR Log Conversion to CSV

THOR Log Conversion to CSV

We are excited to announce that the upcoming version 1.11 our tool, THOR Util, now has the capability to convert log output files from both the default and JSON format into CSV files. This new feature will make it easier for users to analyze their log data and extract...

read more
How to scan ESXi systems using THOR

How to scan ESXi systems using THOR

More and more often, adversaries target and exploit Internet-facing appliances or devices with exotic or restricted operating systems. Users ask if there is a way to run a compromise assessment scan on these systems with the YARA rules used in THOR. Following up on...

read more