How to speed up your investigation: Cyber Triage! Try all these features today → https://lnkd.in/gCuMg4Yw
Cyber Triage
软件开发
SOMERVILLE,MA 3,647 位关注者
Automated investigation platform for SOCs, MSSPs, DFIR Teams, and Law Enforcement
关于我们
Cyber Triage allows you to quickly and efficiently investigate endpoints using automation and artifact scoring. It is used by corporate SOCs, MSSPs, #DFIR teams, consultants, and law enforcement to effectively determine if a computer is compromised and how badly. Cyber Triage is made by Sleuth Kit Labs, which has been building digital forensics tools for over 15 years. It is led by Brian Carrier, PhD, who created the popular open source Autopsy and Sleuth Kit tools over 20 years ago. Cyber Triage can integrate with EDRs and cloud infrastructure to make sure that your corporate security team can quickly collect and analyze the endpoint. Visit the website to try your free 7-day evaluation.
- 网站
-
https://www.cybertriage.com/
Cyber Triage的外部链接
- 所属行业
- 软件开发
- 规模
- 11-50 人
- 总部
- SOMERVILLE,MA
- 类型
- 私人持股
- 创立
- 2016
产品
Cyber Triage
用户与实体行为分析 (UEBA) 软件
The Only Digital Forensics Tool You Need For Incident Response. Complete threat investigation done for you with speed, accuracy, and simplicity. Cyber Triage makes your investigations more efficient using automated scoring and recommendations. If you are a SOC analyst, consultant, or law enforcement officer, Cyber Triage will maximize the artifacts per second that you process and ensure you get the attackers out quickly.
地点
-
主要
1060 Broadway St
US,MA ,SOMERVILLE,02144-2078
Cyber Triage员工
动态
-
Cyber Triage转发了
According to Mandiant, attackers have, on average, 240 hours of free reign before they’re caught. That’s 10 days of stealthy movement, evasion tactics, and potential compromise that your EDR alone won’t reveal. In this live webinar, cybersecurity experts Markus Schober, founder of Blue Cape Security, and Brian Carrier, founder of Sleuth Kit Labs, creator of Cyber Triage, will explain how SOCs can investigate the attack before the alert. They will cover: ?? The attack life cycle ?? EDR evasion tactics ?? How attacks are detected ?? How to find pre-alert activity Join us on March 27th at 11 AM ET / 9 AM PT — ???Register for FREE now → https://lnkd.in/gpYDEjk6 #DFIR #IncidentResponse #ThreatDetection #SOCOperations #EDREvasion #CyberThreats #BlueCapeSecurity
-
-
When to investigate RunMRU: → Fake captchas → Tech support scams → Insider threats Learn how: https://lnkd.in/gsKX5nU8
-
Brian Carrier joins forces for the first time! Markus Schober joins Brian for: What EDRs Miss: The Attack Before The Alert This one-hour webinar explains why EDRs are (almost) always missing attacker activity data, and how SOCs can find it. They will cover: → The attack life cycle. → EDR evasion tactics. → How attacks are detected. → How to find pre-alert activity. Join Brian and Markus on March 27th at 11 AM ET. Register today: https://lnkd.in/diRwDyDk
-
-
How to investigate DFIR’s password hunter: Kerberoasting ? Cyber Triage automatically collects and analyzes Kerberos data to show you what is suspicious. Try it for free today: https://lnkd.in/gCuMg4Yw
-
Brian Carrier wants to know: What topics/content do you all want? Let us know in the comments ??
-
-
Master MUICache. All you need: Chris Ray’s comprehensive guide ? Link → https://lnkd.in/gtZXCt2N
-
This is the EDR Evasion report that we referenced in our Endpoint Triage needs EDR+DFIR webinar from last week. EDR can contain a wealth of information, unless the attackers bypass it.
Cyber Defence | Adversary Simulation | Purple Teaming | Threat Hunting & Intelligence | eCMAP, eCIR, eCTHPv2, eCPTXv2, OSCP, CRTP, CRTE, CRTO, CARTP, CAP, CBSP, MAD CTI, MAD Adversary Emulation ????
?? ?? A leaked conversation from Black Basta operators reveals how they bypass EDR (Endpoint Detection & Response). Instead of direct confrontation, they use stealth techniques, proxying, and legitimate tools to stay undetected. Minimize Exposure on EDR-Protected Systems - Avoid direct execution on the compromised system. - Establish a SOCKS proxy to reroute traffic and interact remotely. - Use Impacket to pivot without leaving traces. Avoid Direct Confrontation with EDR - Unhook security libraries to disable monitoring. - Encrypt payloads to evade signature-based detection. - Use long sleep intervals, executing only one command per day to minimize detection. - Manually review every command before execution to reduce footprint. - Custom tools are preferred, but reliance on known tools like Koba increases detection risk. Exploit EDR Blind Spots - Abuse trusted system binaries for malicious purposes. - Execute payloads through signed Python binaries to bypass security controls. - Leverage native administrative tools instead of dropping malware. Black Basta keeps adapting, pushing the limits of stealth and evasion. If defenders don’t evolve just as fast, they’ll always be one step behind. #OSINT #CTI #BlackBasta #Ransomware #BlueTeam
-
-
Remote monitoring and management (RMM) tool investigations. Our comprehensive guide ? Cyber Triage automatically detects RMM tools and scores them as bad or suspicious, depending on how long the exe has been on the system. Try it for free → https://lnkd.in/gCuMg4Yw
-
What attackers don’t want you to know: EDRs miss DFIR evidence. ? Learn why and how to fix it tomorrow with Brian Carrier Register → https://lnkd.in/gWBWidDe
-