Screenshot of original infection email from Unit 42

Emotet C2 and Spam Traffic Video

This video covers a life cycle of an Emotet infection, including initial infection, command-and-control traffic, and spambot activity sending emails with malicious spreadsheet attachments to infect new victims. The video cannot be ...
Why a U.S. City Chose MixMode and Decommissioned their UBA Platform

Video: Why a U.S. City Chose MixMode and Decommissioned their UBA Platform

| | Blog, case-study, CISO, SIEM, SOC, UBA, video
MixMode’s Head of Sales and Alliances, Geoff Coulehan, shares how MixMode was able to identify critical risk factors coming from inside bad actors that had gone undetected by a large U.S. city’s ...
The Multiplying Costs and Challenges of Data Storage and Retention in Legacy Cybersecurity Platforms

VIDEO: The Multiplying costs and challenges of Data Storage and Retention in Legacy Cybersecurity Platforms

MixMode's Head of Sales and Alliances, Geoff Coulehan, discusses the data retention cost and challenges that arise when legacy cybersecurity platforms require historical data to be organized in a proprietary format for ...
What are the Limits with Rules-Based Cybersecurity Systems

Video: The Limits of Rules-BasED Cybersecurity Systems

MixMode's CTO and Chief Scientist, Dr. Igor Mezic, discusses the challenges of rules-based cybersecurity systems. He focuses on the workflow issues for security analysts that operate in first and second-wave AI (rules-based) ...
Video: Google Cloud and Cybereason Shift the XDR Paradigm to 'Detect and Anticipate'

Video: Google Cloud and Cybereason Shift the XDR Paradigm to ‘Detect and Anticipate’

Cybereason and Google Cloud recently entered into a strategic partnership to bring to market a joint solution, Cybereason XDR powered by Chronicle, in support of our joint mission to reverse the adversary ...
The Exponential Data Problem with Legacy Cybersecurity Tool Stacks

Video: The Exponential Data Problem with Legacy Cybersecurity Tool Stacks

MixMode’s Head of Sales and Alliances, Geoff Coulehan, understands first-hand the challenges current and incoming MixMode customers are facing with their unwieldy cybersecurity tool stacks ...
SEC-T 0x0D: Erik Hjelmvik - Hiding in Plain Sight - How the SolarWinds Hack Went Undetected

How the SolarWinds Hack (almost) went Undetected

My lightning talk from the SEC-T 0x0D conference has now been published on YouTube. This 13 minute talk covers tactics and techniques that the SolarWinds hackers used in order to avoid being ...
Parameters tab in NetworkMiner

Start Menu Search Video

In this video I demonstrate that text typed into the Windows 10 start menu gets sent to Microsoft and how that traffic can be intercepted, decrypted and parsed. The video cannot be ...
ASCII Network Flow Chart

Walkthrough of DFIR Madness PCAP

I recently came across a fantastic digital forensics dataset at dfirmadness.com, which was created by James Smith. There is a case called The Stolen Szechuan Sauce on this website that includes forensic ...