Stamus Networks Blog

We believe that sharing information is necessary to improve global security. The purpose of this blog is to share our experiences, perspectives and experiments.

Subscribe to our Blog

Blog /
Showing 13 results
of 13 items.
Reset All

Category

Feature Spotlight: Contextual Deep Linking

Analysts in a SOC use many different tools on a daily basis. When hunting for security incidents,...

Feature Spotlight: Attack Surface Inventory

As all cybersecurity defenders know, visibility into the network is the key to understanding what...

Uncovered with Clear NDR: Lateral Active Exploits

In this series of articles, we explore a set of use cases that we have encountered in real-world...

Feature Spotlight: Declarations of Compromise™

One of the unique innovations in Clear NDRTM is the feature known as Declaration of Compromise™...

The Hidden Risks of False Positives: How to Prevent Alert Fatigue in Your Organization

Intrusion Detection Systems (IDS) can be powerful threat detection tools, but IDS users frequently...

Uncovered with Clear NDR: Raiz0WorM

In this series of articles we share hands-on experience from active hunts in the real world. We...

Uncovered with Clear NDR: Spyware Missed by EDR

In this series of articles, we explore a set of use cases that we have encountered in real-world...

Uncovered with Clear NDR: Danger in the Datacenter

When the blue team needs to mount a network defense, they must answer some very common questions:

  • ...

Uncovered with Clear NDR: User Agents Tell the Story

Clear NDRTM helps bank identify threat to its accounting network

With the help of the Clear NDR, ...

Uncovered with Clear NDR: Shadow IT

In this series of articles, we explore a set of use cases that we have encountered in real-world...

Uncovered with Clear NDR: MoDi RAT

In this series of articles, we will explore a set of use cases that we have encountered in...