.

Sqrrl

Amazon Web Services acquires Cybersecurity Startup Sqrrl!

Amazon Web Services has made an official announcement that it has acquired Cybersecurity startup Sqrrl that was spun out by two former top-level executives...

HUNTING FOR NETWORK SHARE RECON

This post was originally published here by Matthew Hosburgh.There’s a strong chance you know what your organization is trying to protect. In many cases,...

THREAT HUNTING FOR INTERNAL RDP BRUTE FORCE ATTEMPTS

This post was originally published here by Matthew Hosburgh.In 2015, a targeted attack was discovered. Exposed by Cymmetria, the campaign was known as Patchwork. Their...

SETTING YOUR THREAT HUNTING CALENDAR FOR 2018

This post was originally published here by Kristina Sisk.What is your team hunting for in 2018? If you don’t know, how can you be...

THREAT HUNTING WITH BRO

This post was originally published here by Ryan Nolette.This blog is a quick overview of how I use Bro IDS for threat hunting.Specifically:Example queries...

DECEPTION, BREACHES, AND GOING ON THE OFFENSE TO SEED THE HUNT

This post was originally published here by Matthew Hosburgh.In my previous blog, I explored the areas where certain areas of Active Defense could be used...

THREAT HUNTING: BUY, BUILD, BEG OR BORROW

This post was originally published here by Sqrrl Team.What goes into running a top-notch SOC? Recently, we sat down with Taylor Lehmann, the CISO of Wellforce,...

GOING ON THE OFFENSE TO SEED THE HUNT

This post was originally published here by Matthew Hosburgh.Varying degrees of attacking back have been hotly debated for years. Everything from fear of retaliation to collateral...

SITUATIONAL-AWARENESS DRIVEN THREAT HUNTING

This post was originally published here by Ryan Nolette.For this example, I will limit my search to just high-value targets, such as the domain...

THREAT HUNTING FOR SUSPICIOUS FILE TYPES ON THE HOST

This post was originally published here by  Chris Sanders.In the first part of this series, I discussed how suspicious file types could lead to the discovery...

http://sqrrl.com

Sqrrl is the threat hunting company that enables organizations to target, hunt, and disrupt advanced cyber threats. Sqrrl’s industry-leading threat hunting platform unites link analysis, User and Entity Behavior Analytics (UEBA), and multi-petabyte scalability capabilities into an integrated solution. Sqrrl’s unique approach enables security analysts to discover threats faster and reduces the time and resources required to investigate them.
Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!