What You Need to Know About OpenSSH Vulnerability and New Vulnerable ScenarioResearchWhat You Need to Know About OpenSSH Vulnerability and New Vulnerable ScenarioBackground on the new OpenSSH vulnerability and how Stairwell can help
Data sheet: The Stairwell platformBriefs & sheetsData sheet: The Stairwell platformLearn how the Stairwell platform can help protect your organization against advanced attacks.
Case study: FOX CorporationCase studiesCase study: FOX CorporationSee how FOX achieves improved cybersecurity and quicker response times with Stairwell.
Stairwell threat report: Black Basta overview and detection rulesResearchStairwell threat report: Black Basta overview and detection rulesGain an understanding of the Black Basta ransomware-as-a-service, plus YARA rules for detection.
Importance of evasion resilient security architectureBlogsImportance of evasion resilient security architectureHow evasion resilient security architecture has been foundational to the Stairwell platform.
Stairwell threat report: Vulnerable PuTTY SSH libraries (CVE-2024-31497)ResearchStairwell threat report: Vulnerable PuTTY SSH libraries (CVE-2024-31497)An overview of the CVE as well as a list of software not previously mentioned in the NIST advisory.
Threat report: xz backdoorResearchThreat report: xz backdoorHow Stairwell users have insight into xz backdoor in their organizations, pIus IOCs & YARA rules.
Engineering: Generating synthetic traffic to monitor system healthBlogsEngineering: Generating synthetic traffic to monitor system healthHow do you have confidence your app is working the way it should be? Let's talk creating a prober.
Intro to Stairwell for threat researchersWebinars & videosIntro to Stairwell for threat researchersLearn how threat researchers can use Stairwell in their everyday work.
Stairwell for OT & manufacturingBriefs & sheetsStairwell for OT & manufacturingSee how Stairwell helps OT and manufacturing firms find missed threats.
Proactive response: AnyDesk, any breachResearchProactive response: AnyDesk, any breachAmong rumors of an AnyDesk breach, we developed YARA rules and hunting methods to help customers.
Technical analysis: The silent torrent of VileRATResearchTechnical analysis: The silent torrent of VileRATA technical overview of VileRAT & the group thought to be behind it, as well as IoCs and more.
Why OT and manufacturing environments need better detection capabilitiesBlogsWhy OT and manufacturing environments need better detection capabilities54% of industrial firms suffer from ransomware - how do you find things that slip through?
Signed files: To trust or not to trustWebinars & videosSigned files: To trust or not to trustGet an inside look at Kuiper ransomware in this expert technical analysis.
Signed, sealed, but not always secure: Rethinking trust in digitally-signed certificatesResearchSigned, sealed, but not always secure: Rethinking trust in digitally-signed certificatesResearch and an in-depth look at the double-edge swords that are digitally-signed certificates.