Adversaries Set Their Sights on Oil and Gas Sector
With high profile breaches in the financial, healthcare and retail sectors making news almost daily, it’s no secret that those industries are…
With high profile breaches in the financial, healthcare and retail sectors making news almost daily, it’s no secret that those industries are…
Introduction The Chopper Web shell is a widely used backdoor by Chinese and other malicious actors to remotely access a compromised Web…
With the ever-increasing need for speed and accuracy for digital investigations and incident response, it is imperative that organizations are able to…
Intro and Installation A dedicated endpoint monitoring tool is quickly becoming a necessity among organizations to increase visibility, logging, and alerting to…
Wing Chun (咏春拳), the first Chinese martial art learned by the legendary Bruce Lee, is often best known for its principles of…
Hurricane Panda is a sophisticated adversary believed to be of Chinese origin and known to target infrastructure companies. Their RAT of choice…
As the user base of CrowdResponse multiplies, we see a steady stream of requests from active users. Many use the tool for…
The State of Kernel Exploitation The typical write-what-where kernel-mode exploit technique usually relies on either modifying some key kernel-mode data structure, which…
There are multiple ways to use threat intelligence to monitor networks for suspicious activity -- our Falcon Host platform does it by…
Interest in Machine Learning is on the rise. This was also evidenced by the attendance of our recent CrowdCast on the topic…