video
Emotet C2 and Spam Traffic Video
This video covers a life cycle of an Emotet infection, including initial infection, command-and-control traffic, and spambot activity sending emails with malicious spreadsheet attachments to infect new victims. The video cannot be ...
Video: Why a U.S. City Chose MixMode and Decommissioned their UBA Platform
MixMode’s Head of Sales and Alliances, Geoff Coulehan, shares how MixMode was able to identify critical risk factors coming from inside bad actors that had gone undetected by a large U.S. city’s ...
VIDEO: The Multiplying costs and challenges of Data Storage and Retention in Legacy Cybersecurity Platforms
MixMode's Head of Sales and Alliances, Geoff Coulehan, discusses the data retention cost and challenges that arise when legacy cybersecurity platforms require historical data to be organized in a proprietary format for ...
Video: The Limits of Rules-BasED Cybersecurity Systems
MixMode's CTO and Chief Scientist, Dr. Igor Mezic, discusses the challenges of rules-based cybersecurity systems. He focuses on the workflow issues for security analysts that operate in first and second-wave AI (rules-based) ...
Video: Google Cloud and Cybereason Shift the XDR Paradigm to ‘Detect and Anticipate’
Cybereason and Google Cloud recently entered into a strategic partnership to bring to market a joint solution, Cybereason XDR powered by Chronicle, in support of our joint mission to reverse the adversary ...
Video: The Exponential Data Problem with Legacy Cybersecurity Tool Stacks
MixMode’s Head of Sales and Alliances, Geoff Coulehan, understands first-hand the challenges current and incoming MixMode customers are facing with their unwieldy cybersecurity tool stacks ...
How the SolarWinds Hack (almost) went Undetected
My lightning talk from the SEC-T 0x0D conference has now been published on YouTube. This 13 minute talk covers tactics and techniques that the SolarWinds hackers used in order to avoid being ...
Start Menu Search Video
In this video I demonstrate that text typed into the Windows 10 start menu gets sent to Microsoft and how that traffic can be intercepted, decrypted and parsed. The video cannot be ...
Walkthrough of DFIR Madness PCAP
I recently came across a fantastic digital forensics dataset at dfirmadness.com, which was created by James Smith. There is a case called The Stolen Szechuan Sauce on this website that includes forensic ...
Cybereason vs. REvil Ransomware: The Kaseya Chronicles
As a spate of ransomware attacks continue to dominate the headlines in recent months, the infamous REvil ransomware gang has upped the ante significantly with a wide ranging operation that is suspected ...