Akira: Pulling on the chains of ransomwareResearchAkira: Pulling on the chains of ransomwareStairwell researchers recovered a directory that had been publicly exposed. Here's what they found.
CVE-2023-3519: Stairwell identifies previously unseen attack methodsResearchCVE-2023-3519: Stairwell identifies previously unseen attack methodsDetails on previously unseen threats regarding Citrix CVE-2023-3519.
Stairwell vs. EDRBlogsStairwell vs. EDREDR platforms are a cornerstone of cybersecurity - but as threats advance, the tech also needs to.
Threat intelligence operationalizedBriefs & sheetsThreat intelligence operationalizedMake your threat intel actionable with a game-changing approach.
Next-level threat huntingBriefs & sheetsNext-level threat huntingLearn how threat teams are taking a whole new approach with Stairwell.
Stairwell 101: Hunting for anomaliesBlogsStairwell 101: Hunting for anomaliesAn inside look at the numerous threat hunting strategies you can use in the Stairwell platform
ChamelGang and ChamelDoH: A DNS-over-HTTPS implantResearchChamelGang and ChamelDoH: A DNS-over-HTTPS implantThe first in a series detailing the capabilities of various tools in ChamelGang's arsenal.
Product roundup – May 2023BlogsProduct roundup – May 2023Making hard jobs easier for threat hunters, SOC analysts, and cybersecurity teams as a whole.
Security alert enrichment: Terminator endpoint defense evasion toolResearchSecurity alert enrichment: Terminator endpoint defense evasion toolAn alert enrichment to the report created by CrowdStrike on Terminator.
Jasper the unfriendly loaderResearchJasper the unfriendly loaderThe analysis of JasPer Loader, a trojanized Dynamic Link Library (DLL) file.
New feature: Threat alertsBlogsNew feature: Threat alertsA new alerting feature that utilizes a decision engine to surface potential malware objects.
New feature: Live threat reportsBlogsNew feature: Live threat reportsAutomate a traditionally manual, time-intensive process to give unprecedented confidence.
Product Roundup – March 2023BlogsProduct Roundup – March 2023We’ve had a lot happen in March, and we’re happy to show it off in our first-ever Product Roundup!
What is CIDR? Chasing the detection long tailBlogsWhat is CIDR? Chasing the detection long tailNew thinking is needed where detection can be performed across time windows, away from adversaries.
Why your EDR could use a helping handBlogsWhy your EDR could use a helping handEDRs are great - but they aren’t a panacea and they have their own issues.