The recent global outage caused by an update to CrowdStrike Falcon, CrowdStrike's endpoint...
Don’t let the disarming name fool you.Charming Kitten, also known as APT 35, Newscaster Team, Ajax...
Cozy Bear — also known as APT29, CozyCar, CozyDuke, and others — is a familiar name to security...
This article describes the details of the new Open NRD threat intelligence feeds provided by Stamus...
Operating since 2008, the shadowy figure of Fancy Bear has emerged as a formidable force in the...
This week’s guided threat hunting blog focuses on hunting for high-entropy NRD (newly registered...
Every day, new Internet domains are registered through the Domain Name System (DNS) as a natural...
A couple of weeks ago, we covered how Stamus Security Platform (SSP) users can harness the power of...
Stamus Security Platform (SSP) users can now integrate the Malware Information Sharing Platform...
In a recent conversation, one of our customers shared their concerns about the use of ChatGPT in...
Because cybersecurity teams face numerous threats from bad actors that are continually devising new...
When it comes to cyber threats, we understand that a threat to one organization can quickly become...
This week’s threat detection blog dives deeper into a common type of malware, remote access trojans...
In this week’s threat detection blog, we will be reviewing a financially-motivated threat that is...
This week we are taking a closer look at Shadow IT, which is the use of information technology by...
Phishing is commonly regarded as the most common and effective way attackers can gain access into a...
In this article, we will review one of the most important and critical phases on the cyber kill...
One of the first network-related indications of a botnet or peer-to-peer (P2P) malware infection is...
In this article I want to highlight one of the tactics used by malicious actors to move within your...
In the first article of this series -- Threats! What Threats? -- I mentioned that my colleague,...
When the leadership team at Stamus Networks got together to capture the core principles of our...
In the first article of this series –Threats! What Threats? – I mentioned that my colleague, Steve...
We talk often about “threats” and “threat detection” in our marketing materials and in discussions...