InterContinental Hotels Finds an Unwelcome Guest in 1,175 Properties: Malware

InterContinental Hotels Finds an Unwelcome Guest in 1,175 Properties: Malware

Worldwide hotel group InterContinental Hotels, with brands including Holiday Inn Express, Holiday Inn, Candlewood Suites, Staybridge Suites, Crowne Plaza, Hotel Indigo, and Holiday Inn Resort, has reported an unwelcome guest in nearly one third of their 5,000 global properties: malware.

Webinar Highlights: SANS and Infocyte Detail a New DFIR-based Approach to Threat Hunting

Webinar Highlights: SANS and Infocyte Detail a New DFIR-based Approach to Threat Hunting

Last week forensic expert Alissa Torres from the SANS Institute and Infocyte’s co-founder Chris Gerritz hosted a Webinar on Forensic State Analysis: A New Approach to Threat Hunting. In it they discussed how to adapt Digital Forensics & Incident Response (DFIR) techniques to scalably and proactively hunt for unknown threats across an entire enterprise network. If you missed the webinar here’s some highlights.

Scaling the Hunt for Fileless Malware

Scaling the Hunt for Fileless Malware

The recent explosion in mainstream attacks using “fileless” malware has left many organizations wondering how they can defend themselves. Infocyte has taken a unique approach to threat hunting that works by scanning key parts of volatile memory across thousands of systems at a time, making it possible to detect fileless malware at enterprise scale.

RSAC 2017 Trends: The Endpoint Agent Convergence is Upon Us

RSAC 2017 Trends: The Endpoint Agent Convergence is Upon Us

RSAC is the industry mecca for security pros looking to keep up to speed with the trends in information security and companies showcasing their innovations. This year’s conference attracted over 43,000 attendees and featured two exhibition halls jampacked with hundreds of security vendors. Wandering the halls of RSAC this year, there was a lot of expected marketing hype and some compelling trends that emerged; some of them I saw coming... others, were surprising.

Threat Hunting Using Forensic State Analysis

Threat Hunting Using Forensic State Analysis

Tonight, Infocyte will be attending the 2017 SC Magazine's Awards Ceremony as a nominee for the Best Forensics Solution. It's certainly an honor to be nominated for this award. But frankly, we're a bit of an anomaly in this category. Let me explain. Unlike the other solutions, like Guidance Software's Encase, Infocyte HUNT is not a pure forensics solution. On the contrary, what we have done is novel among commercial cybersecurity products. We have morphed endpoint digital forensics for proactive and scalable threat hunting (the search for unknown compromises/threats that have already bypassed other security controls).

Survey Says Threat Hunting on the Rise to Combat Wave of Cybersecurity Threats

Survey Says Threat Hunting on the Rise to Combat Wave of Cybersecurity Threats

Crowd Research Partners today released the results of its 2017 Threat Hunting Report, revealing critical insights into the new practice of cyber threat hunting as an emerging line of defense to combat advanced cybersecurity threats.