Tag: Security technology
-
Developing and prioritizing a detection engineering backlog based on MITRE ATT&CK
How a SOC can efficiently manage priorities when writing detection logic for various MITRE ATT&CK techniques and what tools can …
-
How much security is enough?
A common perception in the infosec community is that there can never be too much security, but it is understood that “too much” security is …
-
BrandPost: How to Choose Security Technology That Works
The role of a security practitioner is difficult. From operational workflow changes to accommodating the latest application requirement …
-
Wake me up till SAS summit ends
What do cyberthreats, Kubernetes and donuts have in common – except that all three end in “ts”, that is? All these topics will be …
-
Applied YARA training Q&A
On August 31, 2021 we ran a joint webinar between VirusTotal and Kaspersky, with a focus on YARA rules best practices and real world …
-
Managed Detection and Response in Q4 2020
During the reported period, our MDR processed approximately 65 000 alerts, followed by an investigation that resulted in 1 506 incidents …
-
Quick look at CVE-2021-1675 & CVE-2021-34527 (aka PrintNightmare)
Last week Microsoft warned Windows users about vulnerabilities in the Windows Print Spooler service – CVE-2021-1675 and CVE-2021-34527 …
-
How to confuse antimalware neural networks. Adversarial attacks and protection
Сybersecurity companies implement a variety of methods to discover previously unknown malware files. Machine learning (ML) is a powerful …
-
Kids on the Web in 2021: Infinite creativity
In this report we try to understand what occupied children during the last year, from May 2020 to April 2021 …
-
Targeted Malware Reverse Engineering Workshop follow-up. Part 1
With so many questions collected during the Targeted Malware Reverse Engineering webinar we lacked the time to answer them all online, we …
-
How we protect our users against the Sunburst backdoor
The detection logic has been improved in all our solutions to ensure our customers protection. We continue to investigate cyberattack on …
-
GReAT thoughts: Awesome IDA Pro plugins
In the second ‘GReAT Ideas. Powered by SAS’ webinar, I’ll be talking about awesome IDA Pro plugins that I regularly use. This article …
●●●