indicators of compromise - Tagged - Security Boulevard
APT41 Micron's IP was Stolen

Attacks by Prolific APT41 Tied to Chinese Government

Chinese state-sponsored APT41 is behind more cyberattack campaigns than previously known, according to new research from the BlackBerry Research and Intelligence Unit. Inspired by details on Cobalt Strike activity that used a ...
Security Boulevard
Running Robust Managed Detection and Response Services

Running Robust Managed Detection and Response Services

Information security practitioners have published a lot of articles around topics like how to build and run a security operations center (SOC) and specific SOC functions such as incident response and threat ...
Securing the Financial Sector Now and Into the Future with XDR

Securing the Financial Sector Now and Into the Future with XDR

Figuring out if your organization is under attack is typically a time-consuming, labor-intensive affair. Analysts must gather data across multiple security tools and perform careful analysis, a process that can take hours, ...

SolarWinds Attacks Highlight Advantage of Indicators of Behavior for Early Detection

I’ve talked about the SolarWinds Supply Chain Attacks recently more than you'd care to know over the past month or so (just ask anyone who knows me), with key points from a ...

SolarWinds Attacks Highlight Advantage of Indicators of Behavior for Early Detection

I’ve talked about the SolarWinds Supply Chain Attacks recently more than you'd care to know over the past month or so (just ask anyone who knows me), with key points from a ...
Windows remote code printers Bugcrowd

How to Spot Razy Malware Undetected By AV Systems

Examining traffic patterns can help spot malware such as Razy on users’ systems Note: Periodically, security researchers on the Cato Networks Research Lab publish internal findings gained while hunting threats on customer ...
Security Boulevard