<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">
Skip to main content

Blog

Blog Category // Detection & Response

Defending Against Advanced Cyberattacks: 3 Essential Security Solutions

At the start of the year, Microsoft detected a nation-state cyberattack on its corporate systems, highlighting the widespread impact and seriousness of these threats. After defeating the threat, Microsoft shared a blog post detailing the incident as a case study resource ...

Cloud Security: Equip Your Organization Against Cloud-Based Threats

Until early 2020, the oft-heard pushback from legacy security practitioners was that cloud computing could never be as secure as on-premise operations. With the COVID-19 pandemic dramatically and rapidly expanding work-from-home demands, many "cloud naysayers" were forced ...

Easy Cybersecurity Steps That Make a Big Impact

What cybersecurity protections do you need for your business? Unfortunately, as the cyber risks to small and mid-sized organizations increase, it seems as though the expert recommendations are that you need all the cybersecurity protections you can get. While this is true ...

Cyber Incident Analysis: Layered Security in Action

March, 2020 — We recently had a Malicious Operation (Malop) pop up for one of our MSP Partners' small business clients and it turned out to be a true hit, with malicious PowerShell on a couple of hosts with RDP (port 3389) open to the internet. Our Malware Prevention ...

Cyber Defense Roster: Your key players in the fight against cyberattacks

Cyber criminals have no off season, neither should your security. Here’s a lineup of the cybersecurity solutions that team up to be your offense and defense.

The Rubber Ducky: Cyber meets physical with this small hacking tool

Your adversary may not always be on the other side of a screen.

Brute-Forcing: The inelegant but effective way attackers crack your passwords

If a single password was the barrier between an attacker and your network, would it hold up against brute force?

Mimikatz: How cyber attackers harvest credentials post-exploitation

The bad guys got their hands on a powerful tool… and now they use it to get their hands on your passwords.

LOLBins: How cyber attackers bypass traditional security defenses

Learn one method used by attackers to gain a foothold in a network and escalate their privileges.

Phishing and Command & Control: How cyber attackers use emails to gain control

One of the easiest ways for cyber criminals to begin an attack is through a malicious email. Here’s a look at how they do it.

Hidden Threats: Preventing cyberattacks with a layered security approach

Advanced attacks are out there. Advanced malware threats are hiding in software applications many of us use daily and trust. So much so that legitimate software can be difficult to distinguish. New attack vectors are continuously being discovered and attackers are finding ...

Infogressive EDR dominates MITRE ATT&CK Product Evaluations: What it Means for You

What is the MITRE ATT&CK Product Evaluation? The ATT&CK evaluation framework, according to MITRE, is a new development that provides a transparent, customer-centric approach to product evaluation for cyber detection software and solutions. The ATT&CK evaluation ...

Combining the Power of NGAV and EDR

Traditional antivirus simply isn’t enough to fight the advanced, targeted attacks being deployed today. How do you fight back? What solutions do you need to prevent the dramatic loss that can rampage through your company? It’s time to fight back with the next generation of ...

Continuous Monitoring: Proactive Security

What’s your plan if an attack makes it past your defenses? While there are many tools and technologies that fight to keep attackers out, it’s just as important to have a plan if those fail.

Lateral Movement: Legitimate Activity or Real Threat

A good disguise can go a long way. Concealing your real identity and priorities can get you far, especially in cybersecurity. When an attacker is disguised as a legitimate user, it’s harder to detect their presence, often until it’s too late. This is most evident during the ...