Threat Detection and Why You Should Spend More Time Thinking About It
I don’t think anyone would dispute that cyber security has a problem with buzzwords. These are words that start with a fixed definition but ultimately are diluted over time.
I don’t think anyone would dispute that cyber security has a problem with buzzwords. These are words that start with a fixed definition but ultimately are diluted over time.
Late last year, an Apache Struts Remote Code Execution (RCE) vulnerability (CVE-2020-17530) was discovered. In Apache Struts versions 2.0.0 – 2.5.25 a forced Object Graph
Welcome to Threat Hunt Deep Dives, Episode 4! Today we are looking at a recent Apache Struts Remote Code Execution (RCE) vulnerability, CVE-2020-17530. Join us as we put this threat under the microscope.
Let’s face it: threat hunting is a tool and technology-intensive discipline. It can sometimes seem like expensive commercial threat hunting tools and services are the only tools in
It is safe to say that 2020 was a year of “the new normal” for everyone, and doubly so for security teams. Not only has
Cyborg Security, the pioneer in threat hunting and detection content, has released several free community defense measures (CDM) to assist organizations that may have been
A core tenant for malware authors and threat actors is that persistence is key. Afterall, its reported that only 4 percent of users click on phishing links and attachments.
Threat hunting is a practice that can generate significant benefits for organizations. Yet, many organizations still often ask the simple and pointed question: “How do I
Threat Detection Packages SUNBURST Known Malicious DNS Activity • Splunk • Elastic Lucene • Elastic DSL SUNBURST Suspicious Processes for SolarWinds Orion Software • Splunk
Welcome to Threat Hunt Deep Dives, Episode 3! Today we are looking at the recent SolarWinds Supply Chain Compromise and the associated SUNBURST Backdoor (aka Solorigate). Join us as we put this threat under the microscope.