Industry Report
John Norden As I mentioned in a recent blog post, Infocyte is expanding it’s platform capabilities by launching a Microsoft 365 security module this week. We are especially excited for this module which will enhance our endpoint detection and response platform to provide detection, response, and compliance across your entire environment. Although Microsoft 365 has…
Read More »Many of us spent the holidays hunting for Solarwinds backdoors. So where are we now? What did we learn? Whats left to be done? SUNBURST in 2021.
Read More »Wednesday, December 23 Infocyte hosted a webinar with our Co-founder and Chief Product Officer, Chris Gerritz. Chris is a foremost expert in threat hunting and has done a significant amount of research around this recent backdoor and subsequent compromises. He’ll cover: Indicators to search for related to the vulnerable versions of SolarWinds Orion How to…
Read More »Infocyte was recently recognized in Forrester’s Now Tech: Managed Detection and Response Services Providers, Q4 2020. This report showcases Infocyte as an easy path to implement endpoint detection and response (EDR) or managed detection and response (MDR) for mid-size organizations. This report highlights the importance of establishing threat hunting with managed detection and response as…
Read More »Infocyte has published an official Infocyte extension which scans servers for all reported host-based indicators of compromise related to the Solarwinds Orion compromise.
Read More »The concept of “The Prevention Paradox” describes how an increase in prevention can cause you to be less secure. If you are scratching your head right now, you are not alone. This seems counterintuitive on the surface. But let’s go a step further. By preventing every attack vector you can detect, you lose visibility on adversaries…
Read More »By Chris Auger Regardless of your company’s size, from an attacker’s perspective, you have financial resources or can be a conduit to another organization’s funds. Today’s average attack is often part of an advanced persistent threat (APT) that has been in a compromised environment for 200+ days. This is a security risk which needs to…
Read More »By Chris Mills In a recent blog post around Cobalt Strike, Chris Gerritz spoke about how important it was to be prepared and have a true partner in the first hour of a security event. In speaking with our team over the last few weeks, we agreed that this really put into concise words the…
Read More »By John Norden Microsoft 365 is the most popular SaaS productivity and back-office platform in the market today. Microsoft 365 can be a very secure solution, but it must be configured properly and monitored for malicious activity and environmental changes (like configuration, mail forwarding, etc). Most SMBs and many larger enterprises lack the knowledge and…
Read More »By Chris Gerritz Since 2012, Cobalt Strike has been utilized as a proactive way of testing network defenses against advanced threat actor tools, tactics, and procedures (TTPs). The aim, of course, is to mimic the most malicious threat actors and their techniques to test your security posture and practice response procedures. Unfortunately, like most things…
Read More »