October Digest: Carving up threats, and taking the fear out of the cloud

October Digest: Carving up threats, and taking the fear out of the cloud

It's time to give the goosebumps a rest and bring calm back to your SOC. We hope this roundup of Red Canary's trending content from October can help you keep a calm head, even if it is a pumpkin head. But first, one last Halloween themed cybersecurity song parody:

(Best read to the tune of Spooky, Scary, Skeletons)

Spooky scary Charcoal Stork, lurking in your games,

But there’s another threat, that’s made our list of names.

They’re not just in a botnet, or in your USB,

Gamarue is detectable, with endpoint telemetry.


OCTOBER INTELLIGENCE INSIGHTS

Charcoal Stork sticks around and DarkGate crashes in, in this month’s edition of Intelligence Insights


EMU-LATION IS THE SINCEREST FORM OF FLATTERY

With a handful of detection analytics and a few freely available Atomic Red Team tests , you can test your defenses against behaviors commonly associated with Gootloader, one of last year’s top threats.


IS YOUR IR PLAN DOA??

A premortem analysis can identify potential gaps and failure points in your incident response plan before its too late. What is a premortem? >>


SAFELY VALIDATE EXECUTABLE FILE ATTRIBUTES WITH ATOMIC TEST HARNESSES?

New-ATHPortableExecutableRunner builds Portable Executable (PE) files on the fly to validate EDR telemetry. See how it works >>


FIRST LOOK! UPCOMING RED CANARY WEBINARS

November 8 -- INCIDENT RESPONSE BEST PRACTICES?

We're providing best practices to help your organization improve its response performance, and showing how Red Canary boosts your team’s security competency and performs incident response on your behalf. Save my spot >>

?

December 6 -- THE DETECTION SERIES: PREVALENT CLOUD TECHNIQUES?

We’re going to explore how adversaries compromise and navigate their way through Azure and Amazon Web Services (AWS) cloud systems. Join us for actionable strategies on how to harden and better defend your organization against cloud threats. Save my spot >>

?

November 14 -- BACKDOORS & BREACHES: LIVE GAMEPLAY?

This informal game with some of our best and brightest will be unpredictable and on-the-fly – after all, there’s no better way to emulate an incident. Play along with us >>


TRAIN HARD, FIGHT EASY: FAST, EFFECTIVE RESPONSE TO MODERN THREATS


EXPLORING THE DARK ARTS ON macOS



SAFEGUARD YOUR ENDPOINTS AND NETWORK?

The shift to remote work and emergence of new network threat vectors require a different approach to enterprise security. These relatively recent developments compel security and IT professionals to answer several critical questions. 5 steps to enhance my enterprise security >>

LEVEL UP YOUR USER PROTECTION STRATEGY?

As cloud migration and software-as-a-service (SaaS) adoption redefine the security landscape, IT and security leaders face the challenge of protecting user accounts, apps, and systems while balancing tight budgets and time constraints. Within this ever-changing landscape, several critical questions emerge. Understand and manage my user identities and email >>


Thanks for subscribing, make sure to follow Red Canary on LinkedIn for all of the latest updates delivered right to your newsfeed!

要查看或添加评论,请登录

Red Canary的更多文章

社区洞察

其他会员也浏览了