Tag Archives: Security

Advanced Persistent Threat Activity Exploiting Managed Service Providers

Advanced Persistent Threat Activity Exploiting Managed Service Providers

Organizations should configure system logs to detect incidents and to identify the type and scope of malicious activity. Properly configured logs enable rapid containment and appropriate response. Response An organization’s ability to rapidly respond to and recover from an incident begins with the development of an incident response capability. An …

Read More »

Publicly Available Tools Seen in Cyber Incidents Worldwide

Remote Access Trojan: JBiFrost First observed in May 2015, the JBiFrost RAT is a variant of the Adwind RAT, with roots stretching back to the Frutas RAT from 2012. A RAT is a program that, once installed on a victim’s machine, allows remote administrative control. In a malicious context, it …

Read More »

Machine Learning: Your Unfair Advantage Against Attackers

Machine Learning: Your Unfair Advantage Against Attackers

In the never-ending arms race between threat actors and defenders, automation and machine learning have become your ultimate weapons. Today, threat actors employ automation in countless ways to speed up their attacks and evade detection. Outpacing attackers requires the effective use of automation and machine learning. Years ago, our research …

Read More »