Search Results for: IOC Knowledge Center IOC Checker March 5, 2020 What is it? Scans for indicators of compromise (IOCs) Full stack application CLI client + Backend + Web admin console... Blog Post What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in... Blog Post How to Detect Malicious Activity Early? Set up IOCs May 6, 2020 Indicators of Compromise (IOCs) are forensic data IT professionals use to detect malicious activity. It is defined as “pieces of... Blog Post How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Blog Post What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected... Blog Post Kaspersky: RDP Brute Force Attack Attacks Rise May 5, 2020 Kaspersky recently warned that hackers have aggressively attacked the Remote Desktop Protocol (RDP) through brute force methods because of the... Blog Post Hackers File Fake Tax Returns To Steal IRS Refunds April 14, 2020 The number of attempted IRS scams tends to increase every year in March and April in the U.S., as legions... Blog Post Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber... Blog Post CISA Warns On Possible Cyber Attacks Due To Heightened U.S. – China Tensions October 20, 2020 Political affiliations aside, Trump’s hardened stance on China as well as continued trade conflicts has exacerbated longstanding mistrust. Chinese cyber-attacks... Blog Post Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... Knowledge Center Osquery for Cyber Incident Response March 19, 2020 In this case study we demonstrate the use of Osquery framework for cyber security incident response.In this case study we... Blog Post Cognizant hacked by Maze Ransomware Attack May 7, 2020 During the Covid-19 pandemic, Cognizant, the technology solution corp was hacked by Maze group causing huge service disruptions for the... Blog Post K12 Online Schooling Giant Paid Ryuk Ransom To Prevent Data Leaks December 9, 2020 In Mid November 2020, K12, an online education giant, paid Ryuk ransom to the ransomware gang. The Ryuk gang made... Blog Post Ransomware Guide by US CISA and MS-ISAC October 5, 2020 On September 30, 2020, The US Cybersecurity & Infrastructure Security Agency (US CISA) and the Multi-State Information Sharing & Analysis... Blog Post Encrypting your files is not enough for ransomware operators anymore July 9, 2020 Ransomware attacks have become a trend in the malware world, and they are a goldmine for their operators. The usual...
Knowledge Center IOC Checker March 5, 2020 What is it? Scans for indicators of compromise (IOCs) Full stack application CLI client + Backend + Web admin console...
Blog Post What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in...
Blog Post How to Detect Malicious Activity Early? Set up IOCs May 6, 2020 Indicators of Compromise (IOCs) are forensic data IT professionals use to detect malicious activity. It is defined as “pieces of...
Blog Post How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
Blog Post What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected...
Blog Post Kaspersky: RDP Brute Force Attack Attacks Rise May 5, 2020 Kaspersky recently warned that hackers have aggressively attacked the Remote Desktop Protocol (RDP) through brute force methods because of the...
Blog Post Hackers File Fake Tax Returns To Steal IRS Refunds April 14, 2020 The number of attempted IRS scams tends to increase every year in March and April in the U.S., as legions...
Blog Post Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber...
Blog Post CISA Warns On Possible Cyber Attacks Due To Heightened U.S. – China Tensions October 20, 2020 Political affiliations aside, Trump’s hardened stance on China as well as continued trade conflicts has exacerbated longstanding mistrust. Chinese cyber-attacks...
Blog Post Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps...
Knowledge Center Osquery for Cyber Incident Response March 19, 2020 In this case study we demonstrate the use of Osquery framework for cyber security incident response.In this case study we...
Blog Post Cognizant hacked by Maze Ransomware Attack May 7, 2020 During the Covid-19 pandemic, Cognizant, the technology solution corp was hacked by Maze group causing huge service disruptions for the...
Blog Post K12 Online Schooling Giant Paid Ryuk Ransom To Prevent Data Leaks December 9, 2020 In Mid November 2020, K12, an online education giant, paid Ryuk ransom to the ransomware gang. The Ryuk gang made...
Blog Post Ransomware Guide by US CISA and MS-ISAC October 5, 2020 On September 30, 2020, The US Cybersecurity & Infrastructure Security Agency (US CISA) and the Multi-State Information Sharing & Analysis...
Blog Post Encrypting your files is not enough for ransomware operators anymore July 9, 2020 Ransomware attacks have become a trend in the malware world, and they are a goldmine for their operators. The usual...