Stairwell threat report: Black Basta overview and detection rulesResearchStairwell threat report: Black Basta overview and detection rulesGain an understanding of the Black Basta ransomware-as-a-service, plus YARA rules for detection.
Importance of evasion resilient security architectureBlogsImportance of evasion resilient security architectureHow evasion resilient security architecture has been foundational to the Stairwell platform.
Stairwell threat report: Vulnerable PuTTY SSH libraries (CVE-2024-31497)ResearchStairwell threat report: Vulnerable PuTTY SSH libraries (CVE-2024-31497)An overview of the CVE as well as a list of software not previously mentioned in the NIST advisory.
Threat report: xz backdoorResearchThreat report: xz backdoorHow Stairwell users have insight into xz backdoor in their organizations, pIus IOCs & YARA rules.
Engineering: Generating synthetic traffic to monitor system healthBlogsEngineering: Generating synthetic traffic to monitor system healthHow do you have confidence your app is working the way it should be? Let's talk creating a prober.
Intro to Stairwell for threat researchersWebinars & videosIntro to Stairwell for threat researchersLearn how threat researchers can use Stairwell in their everyday work.
Stairwell for OT & manufacturingBriefs & sheetsStairwell for OT & manufacturingSee how Stairwell helps OT and manufacturing firms find missed threats.
Proactive response: AnyDesk, any breachResearchProactive response: AnyDesk, any breachAmong rumors of an AnyDesk breach, we developed YARA rules and hunting methods to help customers.
Technical analysis: The silent torrent of VileRATResearchTechnical analysis: The silent torrent of VileRATA technical overview of VileRAT & the group thought to be behind it, as well as IoCs and more.
Why OT and manufacturing environments need better detection capabilitiesBlogsWhy OT and manufacturing environments need better detection capabilities54% of industrial firms suffer from ransomware - how do you find things that slip through?
Signed files: To trust or not to trustWebinars & videosSigned files: To trust or not to trustGet an inside look at Kuiper ransomware in this expert technical analysis.
Signed, sealed, but not always secure: Rethinking trust in digitally-signed certificatesResearchSigned, sealed, but not always secure: Rethinking trust in digitally-signed certificatesResearch and an in-depth look at the double-edge swords that are digitally-signed certificates.
Stairwell for financial servicesBriefs & sheetsStairwell for financial servicesLearn how Stairwell helps financial services organizations detect the threats missed by others.
Threats keep getting through, and it’s time for a new approachBlogsThreats keep getting through, and it’s time for a new approachFind the threats that keep getting through with a new approach to cybersecurity.
Kuiper ransomware: A technical analysisWebinars & videosKuiper ransomware: A technical analysisGet an inside look at Kuiper ransomware in this expert technical analysis.