OODA: X-Ops Takes On Burgeoning SQL Server Attacks
Credit to Author: Angela Gunn| Date: Wed, 20 Jul 2022 11:00:14 +0000
How do the pieces of Sophos X-Ops fit together? A combined effort makes tidy work of a threat actor’s big play
Read moreCredit to Author: Angela Gunn| Date: Wed, 20 Jul 2022 11:00:14 +0000
How do the pieces of Sophos X-Ops fit together? A combined effort makes tidy work of a threat actor’s big play
Read moreCredit to Author: Angela Gunn| Date: Thu, 14 Jul 2022 08:01:51 +0000
Ngrok is a legitimate remote-access tool. It is regularly abused by attackers, who use its capabilities and reputation to maneuver while bypassing network protections. This incident guide shows Security Operations Centers (SOCs) and response teams how to detect and respond to the suspicious presence or use of ngrok on the network.
Read moreCredit to Author: stephenlawton| Date: Wed, 09 Mar 2022 11:00:47 +0000
Prevent, detect, respond: The three-legged stool to protecting your organization effectively
Read more