Kuiper ransomware analysis: Stairwell’s technical reportResearchKuiper ransomware analysis: Stairwell’s technical reportA detailed technical analysis of an obtained copy of Kuiper ransomware.
Threat reports in 30 secondsWebinars & videosThreat reports in 30 secondsOperationalize your threat intelligence with Stairwell.
Stairwell in 30 secondsWebinars & videosStairwell in 30 secondsSee the power of the Stairwell platform in 30 seconds.
Stepping into the unknown: Uncovering espionage malware with Stairwell Variant DiscoveryResearchStepping into the unknown: Uncovering espionage malware with Stairwell Variant DiscoveryUsing Stairwell's Variant Discovery tool to expand on threat research shared by ESET.
Stairwell’s Variant Discovery: Accelerating, improving, and simplifying Incident ResponseBlogsStairwell’s Variant Discovery: Accelerating, improving, and simplifying Incident ResponseHow Stairwell helps improve the incident response workflow for cybersecurity teams.
Your network, security, and OT appliances are at riskBlogsYour network, security, and OT appliances are at riskLearn why attackers are going after appliances that make up your network, and how to protect them.
Security alert enrichment: ShadowPad variantsResearchSecurity alert enrichment: ShadowPad variantsThe Stairwell Threat Research team shares variants and queries for ShadowPad variant samples.
Stairwell goes beyond the limits of EDRBlogsStairwell goes beyond the limits of EDRWhile EDR is a formidable tool, it's not a silver bullet many organizations hope for.
Understanding the Stairwell forwarderBriefs & sheetsUnderstanding the Stairwell forwarderUnderstand how Stairwell ingests files into the platform with the Stairwell Forwarder.
Akira: Pulling on the chains of ransomwareResearchAkira: Pulling on the chains of ransomwareStairwell researchers recovered a directory that had been publicly exposed. Here's what they found.
CVE-2023-3519: Stairwell identifies previously unseen attack methodsResearchCVE-2023-3519: Stairwell identifies previously unseen attack methodsDetails on previously unseen threats regarding Citrix CVE-2023-3519.
Stairwell vs. EDRBlogsStairwell vs. EDREDR platforms are a cornerstone of cybersecurity - but as threats advance, the tech also needs to.
Threat intelligence operationalizedBriefs & sheetsThreat intelligence operationalizedMake your threat intel actionable with a game-changing approach.
Next-level threat huntingBriefs & sheetsNext-level threat huntingLearn how threat teams are taking a whole new approach with Stairwell.
Incident response in minutesBriefs & sheetsIncident response in minutesLearn how Stairwell helps teams perform incident response in minutes - not days or weeks.