Increase Your SIEM and SOAR ROI with ReversingLabs

Increase Your SIEM and SOAR ROI with ReversingLabs

On one side you have your SIEM investment – technology that lets you connect multiple security event sources, correlate source information, and create events on anything that looks threatening. On the other ...
How to Stop Phishing Attacks Being Missed

How to Stop Phishing Attacks Being Missed

| | Corporate, Modern SOC
Email attacks are a significant problem for all organizations today because of how hard they are to secure. Thousands of emails include attachments, links and large files that need to be processed ...
ChatGPT Makes Waves Inside and Outside of the Tech Industry

ChatGPT Makes Waves Inside and Outside of the Tech Industry

New and Noteworthy: ChatGPT Makes Waves Inside and Outside of the Tech Industry  Since it was made publicly available in December, ChatGPT has prompted all sorts of reactions from both inside and ...
Changes in Retail and Hospitality Cyber Threat Trends During the 2020 and 2021 Holiday Seasons

Changes in Retail and Hospitality Cyber Threat Trends During the 2020 and 2021 Holiday Seasons

Key Infrastructure and Critical Vulnerabilities: New UBER Data Breach Highlights the Organizational Vulnerability From Supply Chain Attacks and Third-Party Software A recent breach of the mobile device management platform Teqtivity has led ...
Hunting Emotet Made Easy with EclecticIQ Endpoint Response

Hunting Emotet Made Easy with EclecticIQ Endpoint Response

  Earlier this year, EclecticIQ Analysts published this article detailing the inner workings of a newly observed Emotet variant. In November, another industry source published a report talking about the resurgence of ...
Using Log Parsing to Stop Microsoft IIS Backdoor Attacks

Using Log Parsing to Stop Microsoft IIS Backdoor Attacks

Chances are you’ve heard of Microsoft’s Internet Information Services, (more commonly known as IIS) as it’s one of the most popular web servers in the world, boasting a user base of over ...
The Analyst Prompt #15: Network Environment-Focused Conversations Needed in Approaches to Cyber Security

The Analyst Prompt #15: Network Environment-Focused Conversations Needed in Approaches to Cyber Security

Exploit Tools and Targets: Enhance Third-Party Risk Management to Mitigate Multi-Targeted Approach Third-party attacks, or supply chain attacks, occur when a trusted software, vendor, or other external company property or personnel is ...
5 Questions to ask About Your EDR – Integration

5 Questions to ask About Your EDR – Integration

This is the final part in our series on some of the capabilities you should be looking for in your Endpoint Detection and Response solution. Why are we writing this series? Choosing ...
5 Questions to ask About Your EDR – Response

5 Questions to ask About Your EDR – Response

This is part 3 in a series on some of the capabilities you should be looking for in your Endpoint Detection and Response solution. Choosing the right EDR solution is important, as ...
Catch ‘em Deletes – Increasing Visibility, Not the cost

Catch ‘em Deletes – Increasing Visibility, Not the cost

Cyber Adversaries, or malware authors, are motivated to remove the traces of the malware’s execution for a variety of reasons including evading “Defense Mechanisms”, as well as ensuring the malware researchers cant ...