indicators of compromise
Automate Tier 1 with Smart SOAR’s Rapid Enrichment System (RES)
Automate data collection, improve visibility, empower security teams with D3's Rapid Enrichment System (RES). Respond quickly & accurately to evolving threats. The post Automate Tier 1 with Smart SOAR’s Rapid Enrichment System ...
IOCs in your APIs
When our customers engage the CQ Prime Threat Research Team for help, it is typically driven by some sort of compelling event. It may have been a potential compliance issue from an ...
Elementary, My Dear IT Pros: Solving Cybersecurity Mysteries
Sherlock Holmes, Hercule Poirot and Miss Marple, Phillip Marlowe, Sam Spade, Nancy Drew and the Hardy Boys … These great (albeit fictional) detectives had two things in common: They always got the ...
The Ransom Disclosure Act and Defending Against Complex RansomOps
On October 5, U.S. Senator Elizabeth Warren (D-Mass.) introduced the Ransom Disclosure Act. She framed it as something that could help the U.S. government learn more about how ransomware operations work ...
Attacks by Prolific APT41 Tied to Chinese Government
Chinese state-sponsored APT41 is behind more cyberattack campaigns than previously known, according to new research from the BlackBerry Research and Intelligence Unit. Inspired by details on Cobalt Strike activity that used a ...
Running Robust Managed Detection and Response Services
Information security practitioners have published a lot of articles around topics like how to build and run a security operations center (SOC) and specific SOC functions such as incident response and threat ...
Securing the Financial Sector Now and Into the Future with XDR
Figuring out if your organization is under attack is typically a time-consuming, labor-intensive affair. Analysts must gather data across multiple security tools and perform careful analysis, a process that can take hours, ...
SolarWinds Attacks Highlight Advantage of Indicators of Behavior for Early Detection
I’ve talked about the SolarWinds Supply Chain Attacks recently more than you'd care to know over the past month or so (just ask anyone who knows me), with key points from a ...
SolarWinds Attacks Highlight Advantage of Indicators of Behavior for Early Detection
I’ve talked about the SolarWinds Supply Chain Attacks recently more than you'd care to know over the past month or so (just ask anyone who knows me), with key points from a ...
How to Spot Razy Malware Undetected By AV Systems
Examining traffic patterns can help spot malware such as Razy on users’ systems Note: Periodically, security researchers on the Cato Networks Research Lab publish internal findings gained while hunting threats on customer ...