A workflow diagram illustrating Smart SOAR's Rapid Enrichment System

Automate Tier 1 with Smart SOAR’s Rapid Enrichment System (RES)

Automate data collection, improve visibility, empower security teams with D3's Rapid Enrichment System (RES). Respond quickly & accurately to evolving threats. The post Automate Tier 1 with Smart SOAR’s Rapid Enrichment System ...
IOCs APIs login application flow

IOCs in your APIs

When our customers engage the CQ Prime Threat Research Team for help, it is typically driven by some sort of compelling event. It may have been a potential compliance issue from an ...
detectives cybersecurity analysis

Elementary, My Dear IT Pros: Solving Cybersecurity Mysteries 

Sherlock Holmes, Hercule Poirot and Miss Marple, Phillip Marlowe, Sam Spade, Nancy Drew and the Hardy Boys … These great (albeit fictional) detectives had two things in common: They always got the ...
Security Boulevard
China cyberespionage

Attacks by Prolific APT41 Tied to Chinese Government

Chinese state-sponsored APT41 is behind more cyberattack campaigns than previously known, according to new research from the BlackBerry Research and Intelligence Unit. Inspired by details on Cobalt Strike activity that used a ...
Security Boulevard
Running Robust Managed Detection and Response Services

Running Robust Managed Detection and Response Services

Information security practitioners have published a lot of articles around topics like how to build and run a security operations center (SOC) and specific SOC functions such as incident response and threat ...
Securing the Financial Sector Now and Into the Future with XDR

Securing the Financial Sector Now and Into the Future with XDR

Figuring out if your organization is under attack is typically a time-consuming, labor-intensive affair. Analysts must gather data across multiple security tools and perform careful analysis, a process that can take hours, ...

SolarWinds Attacks Highlight Advantage of Indicators of Behavior for Early Detection

I’ve talked about the SolarWinds Supply Chain Attacks recently more than you'd care to know over the past month or so (just ask anyone who knows me), with key points from a ...

SolarWinds Attacks Highlight Advantage of Indicators of Behavior for Early Detection

I’ve talked about the SolarWinds Supply Chain Attacks recently more than you'd care to know over the past month or so (just ask anyone who knows me), with key points from a ...
Caliptra semiconductor Ukraine cybersecurity Windows remote code printers Bugcrowd

How to Spot Razy Malware Undetected By AV Systems

Examining traffic patterns can help spot malware such as Razy on users’ systems Note: Periodically, security researchers on the Cato Networks Research Lab publish internal findings gained while hunting threats on customer ...
Security Boulevard