Don’t get Mad, get wise
Credit to Author: Angela Gunn| Date: Tue, 13 Aug 2024 09:59:22 +0000
The “Mad Liberator” ransomware group leverages social-engineering moves to watch out for
Read moreCredit to Author: Angela Gunn| Date: Tue, 13 Aug 2024 09:59:22 +0000
The “Mad Liberator” ransomware group leverages social-engineering moves to watch out for
Read moreCredit to Author: gallagherseanm| Date: Wed, 07 Aug 2024 16:46:31 +0000
STAC6451 threat cluster targets Internet-exposed Microsoft SQL servers for initial access
Read moreCredit to Author: Angela Gunn| Date: Wed, 07 Aug 2024 09:52:08 +0000
Ten recommendations for defenders when natively run EDR isn’t an option
Read moreCredit to Author: Sally Adam| Date: Wed, 24 Jul 2024 09:20:51 +0000
Redirecting risk reduction spend from cyber insurance to MDR services is a win-win, resulting in better protection and lower cost coverage.
Read moreCredit to Author: Sally Adam| Date: Tue, 09 Jul 2024 22:25:06 +0000
Expanding our successful partnership from the United States to Australia.
Read moreCredit to Author: Doug Aamoth| Date: Tue, 18 Jun 2024 13:00:28 +0000
Our view on the latest round of the MITRE Engenuity ATT&CK Evaluations for Managed Services.
Read moreCredit to Author: Angela Gunn| Date: Wed, 12 Jun 2024 18:59:54 +0000
Investigation insights and recommendations from a recent welter of incident-response cases
Read moreCredit to Author: gallagherseanm| Date: Wed, 05 Jun 2024 10:00:46 +0000
Sophos Managed Detection and Response initiated a threat hunt across all customers after the detection of abuse of a vulnerable legitimate VMware executable (vmnat.exe) to perform dynamic link library (DLL) side-loading on one customer’s network. In a search for similar incidents in telemetry, MDR ultimately uncovered a complex, persistent cyberespionage campaign targeting a high-profile government […]
Read more