Category: APT

Preempt MITRE ATT&CK Coverage

MITRE ATT&CK is a framework covering multiple tactics and techniques adversaries use to penetrate systems, move laterally, and ultimately take...
Read Now

Maze Ransomware Analysis and Protection

Last month, an IT services giant, acknowledged it was a victim of a Maze ransomware attack. Maze ransomware is a...
Read Now

Disrupting an Attacker from Exploiting Domain Credentials

Security professionals often feel they don’t have enough time to keep up with modern threats. In fact, Crowdstrike researchers have...
Read Now

Conditional Access Establishes Trust In the Network

Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more...
Read Now

Real-time vs After the Fact: Pitfalls of Log-based Behavioral Threat Detection

It was recently published that Shadow Brokers, the group behind the Equation Group leak, are selling a new set of...
Read Now