The Dangers of Persistent Binaries and How to Spot Them – Part II

| | research
The Second Blog in a Two-Blog Series on Persistent Binary Risks and Strategies Identifying the Persistent Binaries that Matter Finding all the persistent binaries in your environment, which we covered in the first blog of this series, is a vital first step to being able to identify malicious attackers who ... Read More

The Dangers of Persistent Binaries and How to Spot Them – Part II

| | research
The Second Blog in a Two-Blog Series on Persistent Binary Risks and Strategies Identifying the Persistent Binaries that Matter Finding all the persistent binaries in your environment, which we covered in the first blog of this series, is a vital first step to being able to identify malicious attackers who ... Read More
Uri May

Podcast: Uri May Talks XDR with Neil Hughes

| | Opinion, Show in page
Neil Hughes, the author of The Tech Talks Daily podcast, wanted to learn more about the hot emerging category of Extended Threat Detection and Response (XDR). His curiosity led him to Hunters. Hear Uri May, Hunters CEO explains XDR and Hunters’ approach to it. Hunters CEO, Uri May Today’s topic ... Read More
Uri May

Podcast: Uri May Talks XDR with Neil Hughes

| | Opinion, Show in page
Neil Hughes, the author of The Tech Talks Daily podcast, wanted to learn more about the hot emerging category of Extended Threat Detection and Response (XDR). His curiosity led him to Hunters. Hear Uri May, Hunters CEO explains XDR and Hunters’ approach to it. Hunters CEO, Uri May Today’s topic ... Read More
Hunters Customer Testimonial: E.ON with CISO Rene Rindermann

A Year (and a half) of Hunting – Exciting Funding News from Hunters’ CEO

| | company update
18 months ago Tomer Kazaz and I founded Hunters. Both of us started our Cyber journey with the Israeli Intelligence Corps, and both of us had a unique opportunity to witness cybersecurity forming into what it is today: a chaotic and unpredictable realm, mostly dominated by criminals. We set ourselves ... Read More
Hunters Customer Testimonial: E.ON with CISO Rene Rindermann

A Year (and a half) of Hunting – Exciting Funding News from Hunters’ CEO

| | company update
18 months ago Tomer Kazaz and I founded Hunters. Both of us started our Cyber journey with the Israeli Intelligence Corps, and both of us had a unique opportunity to witness cybersecurity forming into what it is today: a chaotic and unpredictable realm, mostly dominated by criminals. We set ourselves ... Read More
X Factor Webinar Josh Zelonis

XDR – The Cybersecurity X Factor

| | Opinion, Show in page
The “X Factor” is defined as an elusive circumstance, quality or entity with a strong positive influence. Simply put, the X Factor is what makes something cool. ‘XDR’ – Extended Detection and Response – is the X Factor in cybersecurity. Sometimes dismissed as merely an extension of EDR (Endpoint Detection ... Read More
X Factor Webinar Josh Zelonis

XDR – The Cybersecurity X Factor

| | Opinion, Show in page
The “X Factor” is defined as an elusive circumstance, quality or entity with a strong positive influence. Simply put, the X Factor is what makes something cool. ‘XDR’ – Extended Detection and Response – is the X Factor in cybersecurity. Sometimes dismissed as merely an extension of EDR (Endpoint Detection ... Read More
Persistent Binaries Blog Image 4

The Dangers of Persistent Binaries and How to Spot Them – Part I

| | research
The First Blog in a Two-Blog Series on Persistent Binary Risks and Strategies. The Dangers of Persistence By ‘getting your foot in the door’ you are getting a chance to do something more. It represents an opening, which is the first step on the path that can ultimately take you ... Read More
Persistent Binaries Blog Image 4

The Dangers of Persistent Binaries and How to Spot Them – Part I

| | research
The First Blog in a Two-Blog Series on Persistent Binary Risks and Strategies. The Dangers of Persistence By ‘getting your foot in the door’ you are getting a chance to do something more. It represents an opening, which is the first step on the path that can ultimately take you ... Read More

Application Security Check Up