SolarWinds Attacks Highlight Advantage of Indicators of Behavior for Early Detection

I’ve talked about the SolarWinds Supply Chain Attacks recently more than you’d care to know over the past month or so (just ask anyone who knows me), with key points from a few of the discussions making their way into the public sphere here and he… Continue reading SolarWinds Attacks Highlight Advantage of Indicators of Behavior for Early Detection

How to Spot Razy Malware Undetected By AV Systems

Examining traffic patterns can help spot malware such as Razy on users’ systems Note: Periodically, security researchers on the Cato Networks MDR team publish internal findings gained while hunting threats on customer networks. These are securit… Continue reading How to Spot Razy Malware Undetected By AV Systems

DHS Alert on Dragonfly APT Contains IOCs, Rules Likely to Trigger False Positives

A joint Technical Alert, TA17–293A, describing the activities of a Russian APT may contain signatures and rules likely to trigger false positives in some security systems. Continue reading DHS Alert on Dragonfly APT Contains IOCs, Rules Likely to Trigger False Positives

What Hack? Burlington Electric Speaks Out

Burlington Electric Department general manager Neale Lunderville speaks out about last week’s incident and response to reports the electric grid had been hacked. Continue reading What Hack? Burlington Electric Speaks Out

OpenIOC – Sharing Threat Intelligence

OpenIOC is an open framework for sharing threat intelligence, sophisticated threats require sophisticated indicators. In the current threat environment, rapid communication of pertinent threat information is the key to quickly detecting, responding and… Continue reading OpenIOC – Sharing Threat Intelligence