Syndicated Blog

Hunters
Knowledge-Powered XDR
image-yoda-starwars

Introducing the ‘Hands-On Security’ Podcast

| | Podcast, research
Hunters’ New Podcast Series Dives Deep Into Cybersecurity Events and Best Practices Cyber attackers increasingly become better at “blending in”, while we, security teams, become better at finding them nonetheless. Every time ...
The Security Benefits of Integrating Identity with Detection & Response

The Security Benefits of Integrating Identity with Detection & Response

Identity Management – Playing a Key Role in Organization Security Participating in Oktane21, Okta’s annual conference, made it clear that this year, more than ever, that identity management takes a critical role ...
Goodbye Event Management, Hello Extended Detection and Response

Goodbye Event Management, Hello Extended Detection and Response

Last week Hunters hosted an exciting webinar featuring Omer Singer, Head of Cyber Security Strategy at Snowflake. While we had an engaging discussion on the evolution of security operations, security as a ...
Silver Sparrow Message

Silver Sparrow – A New Dawn of MacOS Malware

| | research
Last week, a malware dubbed “Silver Sparrow” was discovered by Red Canary. The malware targets MacOS machines with either x86 or M1 chips. Silver Sparrow installations were found in approximately 30K MacOS ...
Tackling Detection Models’ Explainability with SHAP

Tackling Detection Models’ Explainability with SHAP

| | research
Introduction At Hunters we aim to detect threat actors hiding in our customers’ assets. In order to do so, Hunters’ platform autonomously analyzes security logs to search for various types of information: ...
MITRE techniques sunburst attack

SUNBURST: How it Happened and How to Minimize the Risk of Future Nation-State Attacks

| | Opinion
Last week we witnessed what many are calling one of the biggest cyber attacks in recent times. SUNBURST, the malware installed on SolarWinds’ Orion product line in what seems like a nation-state ...
add-data-flows

XDR at the Center of the New SOC

| | Opinion
Key Takeaways from ESG’s most recent survey report “The Impact of XDR in the Modern SOC” ESG’s new survey “The Impact of XDR in the Modern SOC” is out, and one thing ...

The Dangers of Persistent Binaries and How to Spot Them – Part II

| | research
The Second Blog in a Two-Blog Series on Persistent Binary Risks and Strategies Identifying the Persistent Binaries that Matter Finding all the persistent binaries in your environment, which we covered in the ...

The Dangers of Persistent Binaries and How to Spot Them – Part II

| | research
The Second Blog in a Two-Blog Series on Persistent Binary Risks and Strategies Identifying the Persistent Binaries that Matter Finding all the persistent binaries in your environment, which we covered in the ...
Uri May

Podcast: Uri May Talks XDR with Neil Hughes

| | Opinion, Show in page
Neil Hughes, the author of The Tech Talks Daily podcast, wanted to learn more about the hot emerging category of Extended Threat Detection and Response (XDR). His curiosity led him to Hunters ...