Incident Response Ransomware Series – Part 2

October 30, 2019
Opening In part one of this blog post series, we provided an introduction into what ransomware is and how it works. We also provided examples of different types of ransomware, variation of ransomware tactics, and identified that ransomware delivery is traditionally accompanied by other malware to assist in lateral movement and deployment. If you haven’t...
hunting for meaning blog post graphic

Indicators of Compromise – Hunting for Meaning (Part 2)

April 11, 2019
In part one of this blog post series, we briefly looked at why IoC threat data enrichment is important, the value of knowing who your enemy is, and the process of turning threat data into threat intelligence. If you haven’t had a chance to read the first part of this series, take a few minutes...
hunting for meaning blog post graphic

Indicators of Compromise – Hunting for Meaning (Part 1)

April 9, 2019
By the time an Incident Response consultant is contacted, the security event in question is already in motion. So, the goals become: rapid triage, assist in identifying the related threat risks, and make every effort to identify the threat actors involved. Attribution is very difficult when dealing with seasoned and well-funded threat actors, but it...
  • Browse by Category

  • Clear Form