The Importance of Logs
Across all of the nation-state targeted attacks, insider thefts, and criminal enterprises that CrowdStrike has investigated, one thing is clear: logs are…
Across all of the nation-state targeted attacks, insider thefts, and criminal enterprises that CrowdStrike has investigated, one thing is clear: logs are…
The term, “Advanced persistent threat” (APT), has become almost as mainstream as security breaches in everyday news. With a multitude of scary…
Congratulations! You’ve reached the end of yet another proactive engagement with a security services provider. Now that the engagement is over, what…
When your network gets breached – and I do mean when and not if – the first question that needs to be answered is whether the…
Introduction The Chopper Web shell is a widely used backdoor by Chinese and other malicious actors to remotely access a compromised Web…
There is absolutely no doubt that the world is changing more quickly now, thanks to technology, than at any other time since…
With the ever-increasing need for speed and accuracy for digital investigations and incident response, it is imperative that organizations are able to…
As we all know, cybersecurity is very hard to legislate. Everyone agrees on the overall principle, but when it comes time to…
Intro and Installation A dedicated endpoint monitoring tool is quickly becoming a necessity among organizations to increase visibility, logging, and alerting to…
Hurricane Panda is a sophisticated adversary believed to be of Chinese origin and known to target infrastructure companies. Their RAT of choice…