Unsung Hero in Cyber Risk Management
Credit to Author: Ed Cabrera| Date: Tue, 19 Sep 2023 00:00:00 +0000
Behind the scenes of the world of vulnerability intelligence and threat hunting
Read moreCredit to Author: Ed Cabrera| Date: Tue, 19 Sep 2023 00:00:00 +0000
Behind the scenes of the world of vulnerability intelligence and threat hunting
Read moreCredit to Author: Hitomi Kimura| Date: Wed, 13 Sep 2023 00:00:00 +0000
In this blog, we investigate how threat actors used information-stealing malware with EV code signing certificates and later delivered ransomware payloads to its victims via the same delivery method.
Read moreCredit to Author: Ted Lee| Date: Wed, 30 Aug 2023 00:00:00 +0000
We break down a new cyberespionage campaign deployed by a cybercriminal group we named Earth Estries. Analyzing the tactics, techniques, and procedures (TTPs) employed, we observed overlaps with the advanced persistent threat (APT) group FamousSparrow as Earth Estries targets governments and organizations in the technology sector.
Read moreCredit to Author: Don Ovid Ladores| Date: Mon, 07 Aug 2023 00:00:00 +0000
In this entry, we detail our analysis of how the TargetCompany ransomware abused an iteration of fully undetectable (FUD) obfuscator engine BatCloak to infect vulnerable systems.
Read moreCredit to Author: Jon Clay| Date: Thu, 13 Jul 2023 00:00:00 +0000
Embracing platform approach as the path to enhanced security and resilience
Read moreCredit to Author: Shannon Murphy| Date: Fri, 23 Jun 2023 00:00:00 +0000
New uses for generative AI are being introduced every day—but so are new risks.
Read moreCredit to Author: Shannon Murphy| Date: Tue, 20 Jun 2023 00:00:00 +0000
Learn how analysts can search for threats with greater accuracy, speed, and effectiveness.
Read moreCredit to Author: Shannon Murphy| Date: Thu, 15 Jun 2023 00:00:00 +0000
Discover how Companion can help upgrade SOC efficiency and elevate your team to reach their full potential.
Read moreCredit to Author: Shannon Murphy| Date: Thu, 15 Jun 2023 00:00:00 +0000
Discover how Companion can help upgrade SOC efficiency and elevate your team to reach their full potential.
Read moreCredit to Author: Peter Girnus| Date: Fri, 09 Jun 2023 00:00:00 +0000
We look into BatCloak engine, its modular integration into modern malware, proliferation mechanisms, and interoperability implications as malicious actors take advantage of its fully undetectable (FUD) capabilities.
Read more