The Callback is Coming From Inside the House!
A ransomware group hiring insiders… A disgruntled system administrator… and a simple, yet undetectable payload, set the stage for a scenario every CISO fears: a
A ransomware group hiring insiders… A disgruntled system administrator… and a simple, yet undetectable payload, set the stage for a scenario every CISO fears: a
These days, threat hunting has become a hot topic in the news and the cyber security industry. Everywhere you look, people are trying to show
You’ve probably heard the term “proactive threat hunting” pop up in the news a lot lately. It seems like, these days, everywhere you turn someone
You’ve probably heard the term “proactive threat hunting” pop up in the news a lot lately. It seems like, these days, everywhere you turn someone
Earlier this year saw one of the most devastating ransomware attacks in history that shutdown the Colonial Pipeline and crippled oil and gas delivery across
Earlier this year an as-of-yet unnamed actor targeted the Colonial Pipeline Company using the DarkSide ransomware. The attack crippled the largest energy pipeline in the
Earlier this year an unnamed ransomware group crippled the Colonial Pipeline Company using the DarkSide ransomware. The attack shutdown the largest oil distribution system in
Threat hunting is one of the most valuable forms of proactive defense available to organizations. It enables specially trained ‘hunt teams’ to search the environment
Threat hunting is one of the most powerful capabilities an organization can have. It enables identification of new and emerging threats in an environment. Often