Search Results for: indicators of compromise Blog Post How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Blog Post What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in... Blog Post How to Detect Malicious Activity Early? Set up IOCs May 6, 2020 Indicators of Compromise (IOCs) are forensic data IT professionals use to detect malicious activity. It is defined as “pieces of... Knowledge Center IOC Checker March 5, 2020 What is it? Scans for indicators of compromise (IOCs) Full stack application CLI client + Backend + Web admin console... Blog Post What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected... Blog Post A new wave of cyber attacks against email servers: Sandworm Attacks June 30, 2020 The US National Security Agency (NSA) has published a security alert warning of a new wave of cyberattack against email... Blog Post Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber... Blog Post CISA Warns On Possible Cyber Attacks Due To Heightened U.S. – China Tensions October 20, 2020 Political affiliations aside, Trump’s hardened stance on China as well as continued trade conflicts has exacerbated longstanding mistrust. Chinese cyber-attacks... Blog Post What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during... Blog Post The Importance of Threat Hunting July 17, 2020 Organizations should constantly be on alert for possible cyber threats lurking around, given the rapidly evolving tactics, weapons, and technologies... Blog Post Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,... Blog Post Cybersecurity Events Tips for March and April March 18, 2021 The cybersecurity goes ahead even in these special times. Organizations dedicated to this area also provide several events, webinars and... Blog Post Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email... Blog Post Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they... Knowledge Center Osquery for Cyber Incident Response March 19, 2020 In this case study we demonstrate the use of Osquery framework for cyber security incident response.In this case study we...
Blog Post How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
Blog Post What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in...
Blog Post How to Detect Malicious Activity Early? Set up IOCs May 6, 2020 Indicators of Compromise (IOCs) are forensic data IT professionals use to detect malicious activity. It is defined as “pieces of...
Knowledge Center IOC Checker March 5, 2020 What is it? Scans for indicators of compromise (IOCs) Full stack application CLI client + Backend + Web admin console...
Blog Post What is Fileless Malware? How Does it Work? November 6, 2020 As the name suggests, fileless malware does not rely on any physical files being transferred and stored on the infected...
Blog Post A new wave of cyber attacks against email servers: Sandworm Attacks June 30, 2020 The US National Security Agency (NSA) has published a security alert warning of a new wave of cyberattack against email...
Blog Post Top tactics used in critical attacks against corporate endpoints October 16, 2020 Companies have suffered under a growing barrage of high-profile cyberattacks over the last decade. If it’s not enough that cyber...
Blog Post CISA Warns On Possible Cyber Attacks Due To Heightened U.S. – China Tensions October 20, 2020 Political affiliations aside, Trump’s hardened stance on China as well as continued trade conflicts has exacerbated longstanding mistrust. Chinese cyber-attacks...
Blog Post What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during...
Blog Post The Importance of Threat Hunting July 17, 2020 Organizations should constantly be on alert for possible cyber threats lurking around, given the rapidly evolving tactics, weapons, and technologies...
Blog Post Security Information and Event Management Series Part 3: Main capabilities of SIEM November 2, 2020 In the first part of this four-part series, we covered the need for SIEM solutions and explained the fundamentals. Then,...
Blog Post Cybersecurity Events Tips for March and April March 18, 2021 The cybersecurity goes ahead even in these special times. Organizations dedicated to this area also provide several events, webinars and...
Blog Post Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email...
Blog Post Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they...
Knowledge Center Osquery for Cyber Incident Response March 19, 2020 In this case study we demonstrate the use of Osquery framework for cyber security incident response.In this case study we...