Malware variants are a big problem – but finding them doesn’t have to beBriefs & sheetsMalware variants are a big problem – but finding them doesn’t have to beImmediately pivot from known malware to related malware in a matter of seconds.
Heard in the ‘well: License to phish – Ep. 1Webinars & videosHeard in the ‘well: License to phish – Ep. 1Join Andy Liu and Rory Wohl as they delve into the nitty-gritty of phishing.
Unmasked: Supply chain attacksWebinars & videosUnmasked: Supply chain attacksWhy enterprises should be rethinking the software they use and more.
Never let a server fall out of sync with a databaseBlogsNever let a server fall out of sync with a databaseHow we make changes to our database without bringing other systems down.
Exmatter: Clues to the future of data extortionResearchExmatter: Clues to the future of data extortionAn analysis of Exmatter and a look at the potential future of the threat landscape.
Security at StairwellBriefs & sheetsSecurity at StairwellStairwell’s approach to security and compliance for the Stairwell platform.
Threat report: Maui ransomwareResearchThreat report: Maui ransomwareA technical overview of Maui ransomware to provide a starting point for research.
Beneath the surface of Maui ransomwareWebinars & videosBeneath the surface of Maui ransomwareGet an inside look at Maui ransomware, the threat actors behind it, and more.
Triage every alert with research-grade understandingBriefs & sheetsTriage every alert with research-grade understandingTriage every alert with the level of understanding that you get from a senior analyst.
Make the threat-of-the-day a non-eventBriefs & sheetsMake the threat-of-the-day a non-eventStop hoping that the latest cyberattack or vulnerability headline doesn’t affect your business.
Detect hidden threatsBriefs & sheetsDetect hidden threatsGain visibility into malicious activity that traditional point-in-time defenses miss.
Create customized defenses with contextual intelBriefs & sheetsCreate customized defenses with contextual intelBuild a tailored defense system based on the unification of external and internal intel.
Scalable data processing with a distributed job schedulerBlogsScalable data processing with a distributed job schedulerHow we redesigned our job-scheduling system to remove the database as a bottleneck.
Black hoodies not requiredBlogsBlack hoodies not requiredOne of the hardest challenges in cybersecurity is hiring for cybersecurity.
The origin story of APT32 macros: The StrikeSuit Gift that keeps givingResearchThe origin story of APT32 macros: The StrikeSuit Gift that keeps givingUnearth a demon from the ancient world: a malware source code package called StrikeSuit Gift.