Stamus Networks Blog

We believe that sharing information is necessary to improve global security. The purpose of this blog is to share our experiences, perspectives and experiments.

Subscribe to our Blog

Blog /
Showing 18 results
of 18 items.
Reset All

Category

Stamus Networks at Forum InCyber – See Clear NDR in Action!

Stamus Networks will be exhibiting Forum InCyber, one of Europe’s leading cybersecurity events,...

Dramatically Reduce MTTD & MTTR: 2 Clicks to Evidence with Clear NDR™

This blog post details how Clear NDR drastically reduces Mean Time to Detect (MTTD) and Mean Time...

Feature Spotlight: Contextual Deep Linking

Analysts in a SOC use many different tools on a daily basis. When hunting for security incidents,...

Feature Spotlight: Attack Surface Inventory

As all cybersecurity defenders know, visibility into the network is the key to understanding what...

Feature Spotlight: Declarations of Policy Violation™

One of the new, exciting innovations available with the release ofClear NDRTM U40 is the inclusion...

Uncovered with Clear NDR: Lateral Active Exploits

In this series of articles, we explore a set of use cases that we have encountered in real-world...

Introducing Open NRD: Newly Registered Domain Threat Intel Feeds for Suricata

This article describes the details of the new Open NRD threat intelligence feeds provided by Stamus...

Threat Hunting for Unknown Actors & Threats using NRD and Sightings

This week’s guided threat hunting blog focuses on hunting for high-entropy NRD (newly registered...

Feature Spotlight: Declarations of Compromise™

One of the unique innovations in Clear NDRTM is the feature known as Declaration of Compromise™...

The Hidden Risks of False Positives: How to Prevent Alert Fatigue in Your Organization

Intrusion Detection Systems (IDS) can be powerful threat detection tools, but IDS users frequently...

Uncovered with Clear NDR: Raiz0WorM

In this series of articles we share hands-on experience from active hunts in the real world. We...

Uncovered with Clear NDR: Spyware Missed by EDR

In this series of articles, we explore a set of use cases that we have encountered in real-world...

Uncovered with Clear NDR: Danger in the Datacenter

When the blue team needs to mount a network defense, they must answer some very common questions:

  • ...

Uncovered with Clear NDR: User Agents Tell the Story

Clear NDRTM helps bank identify threat to its accounting network

With the help of the Clear NDR, ...

Uncovered with Clear NDR: Shadow IT

In this series of articles, we explore a set of use cases that we have encountered in real-world...

Uncovered with Clear NDR: MoDi RAT

In this series of articles, we will explore a set of use cases that we have encountered in...