Organizations are making email more secure, and it’s paying off

Compromised identities have been a central component of countless costly breaches this year, according to Red Canary. Rise in identity and cloud-native attacks While most of the threats and techniques identified in the 2024 report remain consistent wit… Continue reading Organizations are making email more secure, and it’s paying off

Key MITRE ATT&CK techniques used by cyber attackers

While the threat landscape continues to shift and evolve, attackers’ motivations do not, according to a Red Canary report. The classic tools and techniques adversaries deploy remain consistent–with some notable exceptions. The report tracked MITRE ATT&… Continue reading Key MITRE ATT&CK techniques used by cyber attackers

Short-term AWS access tokens allow attackers to linger for a longer while

Attackers usually gain access to an organization’s cloud assets by leveraging compromised user access tokens obtained via phishing, by using malware, or by finding them in public code repositories. These are long-term access tokens associated wit… Continue reading Short-term AWS access tokens allow attackers to linger for a longer while

Black Hat USA 2022 video walkthrough

In this Help Net Security video, we take you inside Black Hat USA 2022 at the Mandalay Bay Convention Center in Las Vegas. The video features the following vendors: Abnormal Security, Adaptive Shield, Airgap, Akamai, Anomali, Arctic Wolf Networks, Aris… Continue reading Black Hat USA 2022 video walkthrough

How adversaries are leveraging pentesting tools to launch attacks

In this Help Net Security video, Tony Lambert, Senior Malware Analyst at Red Canary, talks about how adversaries’ favorite tools are legitimate tools that are used for malicious purposes.
The post How adversaries are leveraging pentesting tools to laun… Continue reading How adversaries are leveraging pentesting tools to launch attacks

Trends, threats and techniques that comprised the 2021 threat landscape

Ransomware dominated the threat landscape in 2021, with groups adopting new techniques such as double extortion and “as-a-service” models to evade detection and maximize their earnings, a Red Canary report reveals. The report explores the top 10 threat… Continue reading Trends, threats and techniques that comprised the 2021 threat landscape

Red Canary enters cloud workload protection space, launches Red Canary Cloud Workload Protection

Red Canary Cloud Workload Protection secures cloud environments with a lightweight sensor, proven threat detection platform, and security expertise Denver – October 27, 2020 Red Canary, a leading provider of security operations solutions, announced the… Continue reading Red Canary enters cloud workload protection space, launches Red Canary Cloud Workload Protection