Corporate
Increase Your SIEM and SOAR ROI with ReversingLabs
On one side you have your SIEM investment – technology that lets you connect multiple security event sources, correlate source information, and create events on anything that looks threatening. On the other ...
How to Stop Phishing Attacks Being Missed
Email attacks are a significant problem for all organizations today because of how hard they are to secure. Thousands of emails include attachments, links and large files that need to be processed ...
ChatGPT Makes Waves Inside and Outside of the Tech Industry
New and Noteworthy: ChatGPT Makes Waves Inside and Outside of the Tech Industry Since it was made publicly available in December, ChatGPT has prompted all sorts of reactions from both inside and ...
Changes in Retail and Hospitality Cyber Threat Trends During the 2020 and 2021 Holiday Seasons
Key Infrastructure and Critical Vulnerabilities: New UBER Data Breach Highlights the Organizational Vulnerability From Supply Chain Attacks and Third-Party Software A recent breach of the mobile device management platform Teqtivity has led ...
Hunting Emotet Made Easy with EclecticIQ Endpoint Response
Earlier this year, EclecticIQ Analysts published this article detailing the inner workings of a newly observed Emotet variant. In November, another industry source published a report talking about the resurgence of ...
Using Log Parsing to Stop Microsoft IIS Backdoor Attacks
Chances are you’ve heard of Microsoft’s Internet Information Services, (more commonly known as IIS) as it’s one of the most popular web servers in the world, boasting a user base of over ...
The Analyst Prompt #15: Network Environment-Focused Conversations Needed in Approaches to Cyber Security
Exploit Tools and Targets: Enhance Third-Party Risk Management to Mitigate Multi-Targeted Approach Third-party attacks, or supply chain attacks, occur when a trusted software, vendor, or other external company property or personnel is ...
5 Questions to ask About Your EDR – Integration
This is the final part in our series on some of the capabilities you should be looking for in your Endpoint Detection and Response solution. Why are we writing this series? Choosing ...
5 Questions to ask About Your EDR – Response
This is part 3 in a series on some of the capabilities you should be looking for in your Endpoint Detection and Response solution. Choosing the right EDR solution is important, as ...
Catch ‘em Deletes – Increasing Visibility, Not the cost
Cyber Adversaries, or malware authors, are motivated to remove the traces of the malware’s execution for a variety of reasons including evading “Defense Mechanisms”, as well as ensuring the malware researchers cant ...