Strengthen Your Security Operations: MITRE ATT&CK Mapping in Cisco XDR

Strengthen Your Security Operations: MITRE ATT&CK Mapping in Cisco XDR

In the intricate dance between cyber attackers and defenders, understanding adversary behavior is the difference between keeping up with sophisticated attacks or falling behind the evolving threat landscape. For security teams, this often feels like trying to navigate a maze blindfolded since adversaries typically have greater insights into defender strategies than defenders have into adversarial attacks. This lack of visibility can lead to reactive cybersecurity with ineffective security operations, poor incident response, and a weak…

Read More

Agniane Stealer: Information stealer targeting cryptocurrency users

Agniane Stealer: Information stealer targeting cryptocurrency users

The Agniane Stealer is an information-stealing malware mainly targeting the cryptocurrency wallets of its victims. It gained popularity on the internet starting in August 2023. Recently, we have observed a distinct campaign spreading it across our telemetry. Our recent study has led to the successful identification and detailed analysis of a previously unrecognized network URL pattern. Our researchers have recently uncovered more information on the malware’s methods for file collection and the intricacies of its…

Read More

4 Threat Hunting Techniques to Prevent Bad Actors in 2024

4 Threat Hunting Techniques to Prevent Bad Actors in 2024

Today’s cybersecurity threats are highly sophisticated; bad actors are using technology like no-code malware and AI-generated phishing campaigns to breach company networks with alarming frequency. With traditional detection methods failing to adequately protect networks, data and users, security teams must take a more proactive approach to identifying threats. Threat hunting involves preemptively searching for threat indicators and potential vulnerabilities on the network that other tools missed. This guide discusses threat hunting techniques and solutions to…

Read More

What Is Cyber Threat Hunting? (Definition & How it Works)

What Is Cyber Threat Hunting? (Definition & How it Works)

Cyber threat hunting involves proactively searching for threats on an organization’s network that are unknown to (or missed by) traditional cybersecurity solutions. A recent report from Armis found that cyber attack attempts increased by 104% in 2023, underscoring the need for pre-emptive threat detection to prevent breaches. What is cyber threat hunting? Cyber threat hunting is a proactive security strategy that seeks to identify and eliminate cybersecurity threats on the network before they cause any…

Read More