video

IRONSCALES Extends Email Security Platform to Combat Deepfakes
IRONSCALES has extended the reach of the machine learning algorithms it uses to identify email anomalies to now include the video and audio files used to create deepfakes ...
Security Boulevard
Decoding njRAT traffic with NetworkMiner
Erik Hjelmvik | | .cap, #EX, 2d65bc3bff4a5d31b59f5bdf6e6311d7, BLADABINDI, Ex fm, Ex proc, inv, kl, NetworkMiner, ngrok.io, njrat, PLG, REMnux, ret, video, videotutorial, Y262SUCZ4UJJ
I investigate network traffic from a Triage sandbox execution of njRAT in this video. The analysis is performed using NetworkMiner in Linux (REMnux to be specific). About njRAT / Bladabindi njRAT is ...

Why Application Detection and Response (ADR) is Exciting for Cybersecurity | Contrast Security
What is it about the rise of application detection and response (ADR) that’s exciting cybersecurity experts? ...

Combating Alert Fatigue with the MixMode AI Assistant
Josh Snow | | AI, AI assistant, Alert Fatigue, Alert Reduction, Blog, feature, generative AI, MixMode News, MixMode Platform, SOC, SOC analyst, video
Combating alert fatigue is a huge challenge faced by SOC analysts and security companies alike. The overwhelming flood of rules-based alerts and notifications can often lead to missed critical incidents and increased ...

Firewalls Are Not Enough: Understanding the Fortinet Flaw and How MixMode Enhances Security
Firewalls have been the go-to solution for years, but as technology advances, so do the tactics of malicious actors. A recent security flaw discovered in Fortinet firewalls has reignited the debate about ...

Detecting the MOVEit Zero-Day: How MixMode AI Stays Ahead of Threats
Josh Snow | | Exploits, MOVEit, video, Zero Day Attacks, zero-day, zero-day attack, zero-day attack identification, Zero-day threats
We discuss a real-life example of a zero-day exploit, focusing on the MOVEit Transfer Software, and how MixMode can detect and mitigate such threats before they become widespread ...
New Video: Broken Promises and Bright Future – Preparing for the Next Wave of AI in Cybersecurity
Christian Wiens | | Adversarial AI, AI, Artificial Intelligence, Artificial Intelligence Cybersecurity, Blog, Context Aware AI, cyber attacks, Cyber Threats, Cybersecurity News, Data Overload, MixMode News, MixMode Team, Municipalities, Network Security, Ransomware, Self-Supervised AI, SOC, Third Wave AI, video
MixMode’s Chief Strategy Officer, Matt Shea was invited to provide the opening keynote address, setting the stage for discussions on how businesses and municipalities can better protect their networks and environments from ...
How to Identify IcedID Network Traffic
Erik Hjelmvik | | a0e9f5d64349fb13191bc781f81f42e1, b523e3d33e7795de49268ce7744d7414aa37d1db, beacon, CapLoader, ec74a5c51106f0419184d0dd08fb05bc, GzipLoader, IcedID, Periodic connections, periodicity, video
Brad Duncan published IcedID (Bokbot) from fake Microsoft Teams page earlier this week. In this video I take a closer look at the PCAP file in that blog post. The video cannot ...

CapLoader 1.9.5 Alerts on Malicious Traffic
Erik Hjelmvik | | Alerts, CapLoader, Kovter, njrat, Port-protocol mismatch, Threat Hunting, video, VLAN
CapLoader 1.9.5 was released today! The most important addition in the 1.9.5 release is the new Alerts tab, in which CapLoader warns about malicious network traffic such as command-and-control protocols. The alerts ...

How to turn the tables on tomorrow’s threat agent
Traditional security solutions worked fine when there was a strict perimeter around the corporate network, and workers only needed to access it when they were physically in the office on a corporate ...