Remote Desktop Protocol: How to Use Time Zone Bias
Credit to Author: Angela Gunn| Date: Wed, 20 Mar 2024 16:13:08 +0000
Where in the world is your attacker? Presenting a less-known but useful event to look for in your logs
Read moreCredit to Author: Angela Gunn| Date: Wed, 20 Mar 2024 16:13:08 +0000
Where in the world is your attacker? Presenting a less-known but useful event to look for in your logs
Read moreCredit to Author: Angela Gunn| Date: Wed, 20 Mar 2024 16:11:40 +0000
Keeping an eye on who’s trying to get onto your network – whether or not they’re successful – can pay off on multiple fronts
Read moreCredit to Author: Angela Gunn| Date: Wed, 20 Mar 2024 16:09:06 +0000
On the hunt for successful RDP connections that have entered your network from outside? A step-by-step guide (and a query to get you started)
Read moreCredit to Author: Angela Gunn| Date: Tue, 14 Nov 2023 11:00:10 +0000
The remarkable decline in attacker dwell time is now well-documented, but what does that mean for those doing the hands-on work of infosecurity?
Read moreCredit to Author: Angela Gunn| Date: Wed, 08 Nov 2023 17:19:24 +0000
A threat hunt looks at three attacker changes to a compromised Active Directory, and explains how to both understand and overcome them
Read moreCredit to Author: rajansanhotra| Date: Fri, 01 Sep 2023 12:34:31 +0000
An elite team of incident response experts on standby to get you back to business quickly in the event of a breach.
Read moreCredit to Author: Angela Gunn| Date: Wed, 23 Aug 2023 10:01:02 +0000
A deep dive into incident-response cases from the first half of this year finds both attackers and defenders picking up the pace
Read moreCredit to Author: gallagherseanm| Date: Mon, 31 Jul 2023 10:00:38 +0000
The new SEC cybersecurity rules significantly enhance disclosure requirements, emphasize the board’s role in risk management, and introduce a stringent four-day reporting timeline, necessitating that public companies bolster their cybersecurity strategies, improve incident response processes, and ensure robust communication plans are in place.
Read moreCredit to Author: gallagherseanm| Date: Tue, 09 May 2023 20:27:03 +0000
A new recently observed ransomware family dubbed Akira uses a retro aesthetic on their victim site very reminiscent of the 1980s green screen consoles and possibly takes its namesake from the popular 1988 anime film of the same name.
Read moreCredit to Author: Angela Gunn| Date: Tue, 25 Apr 2023 10:00:03 +0000
A deep dive into over 150 incident-response cases reveals both attackers and defenders picking up the pace
Read more