Explore the new Atomic Red Team website(link is external) The Red Canary Blog: Information Security Insights 8 months 3 weeks ago The redesigned Atomic Red Team website features a new browser interface, improved search capabilities, and easier test execution Phil Hagen
From the dreamhouse to the SOC: Ken’s guide to security(link is external) The Red Canary Blog: Information Security Insights 8 months 3 weeks ago Unboxing some of the year’s most prevalent threats with detection and prevention guidance from Barbie’s boyfriend Laura Brosnan
Artificial authentication: Understanding and observing Azure OpenAI abuse(link is external) The Red Canary Blog: Information Security Insights 9 months ago Adversaries can compromise key material in Azure OpenAI to host malicious models, poison trained models, and steal intellectual property. Matt Graeber
Intelligence Insights: October 2024(link is external) The Red Canary Blog: Information Security Insights 9 months 1 week ago LummaC2 lurks thanks to PowerShell pasting in this month's edition of Intelligence Insights The Red Canary Team
Apple picking: Bobbing for Atomic Stealer & other macOS malware(link is external) The Red Canary Blog: Information Security Insights 9 months 3 weeks ago Your company’s Apple devices are ripe for attacks using macOS malware such as Atomic Stealer. Here’s what to look out for. Laura Brosnan
Infosec horoscopes: Astrology for SOC teams(link is external) The Red Canary Blog: Information Security Insights 10 months ago Zodiac-inspired predictions, advice, and resources for security operations center (SOC) teams and other infosec professionals Susannah Clark Matt
Intelligence Insights: September 2024(link is external) The Red Canary Blog: Information Security Insights 10 months 1 week ago We share virtual private network hardening guidance to cut through FOG ransomware in this month's edition of Intelligence Insights The Red Canary Team
Keep track of AWS user activity with SourceIdentity attribute(link is external) The Red Canary Blog: Information Security Insights 10 months 1 week ago The SourceIdentity attribute in AWS’s Security Token Service (STS) can help defenders trace AWS role activity back to its source. Jesse Griggs
Trending cyberthreats and techniques from the first half of 2024(link is external) The Red Canary Blog: Information Security Insights 10 months 2 weeks ago We’re revisiting our annual Threat Detection Report with a midyear update highlighting trends from detections in the first half of 2024. Brian Donohue
The CrowdStrike outage: Detection and defense in depth(link is external) The Red Canary Blog: Information Security Insights 10 months 3 weeks ago By adopting defense in depth, security operations teams can avoid any single point of failure in the tangles of the global supply chain Keith McCammon
Detecting brute-force attacks with a smart watchlist(link is external) The Red Canary Blog: Information Security Insights 10 months 3 weeks ago Tre Wilkins
Reel in troves of data with webhooks(link is external) The Red Canary Blog: Information Security Insights 11 months ago Red Canary uses AWS API Gateway webhooks to process floods of security telemetry every day. Here's how we do it. James Prior
Recent dllFake activity shares code with SecondEye(link is external) The Red Canary Blog: Information Security Insights 11 months 1 week ago Red Canary Intel discovered overlaps in code between dllFake and previous campaigns leveraging Iranian user monitoring software SecondEye. Red Canary Intelligence
Intelligence Insights: August 2024(link is external) The Red Canary Blog: Information Security Insights 11 months 1 week ago Keep tabs on ChromeLoader and other browser-related threats in this month's edition of Intelligence Insights The Red Canary Team
A defender’s guide to crypters and loaders(link is external) The Red Canary Blog: Information Security Insights 11 months 4 weeks ago Experts from Red Canary and elsewhere break down how adversaries rely on crypters and loaders, including detection guidance Susannah Clark Matt
Certified evil: Investigating signed malicious binaries(link is external) The Red Canary Blog: Information Security Insights 1 year ago Adversaries often sign malicious binaries to create a facade of validity, but a signed binary isn’t necessarily a safe one Brian Donohue
5 lessons for entry-level software engineers(link is external) The Red Canary Blog: Information Security Insights 1 year ago A Red Canary software engineer looks back on the first three years of her career and offers advice for those just getting started Belle Scott
Intelligence Insights: July 2024(link is external) The Red Canary Blog: Information Security Insights 1 year ago Amber Albatross arrives via potentially unwanted programs (PUP) and dllFake debuts in this month's edition of Intelligence Insights The Red Canary Team
How Red Canary works to create an accessible coding environment for all(link is external) The Red Canary Blog: Information Security Insights 1 year ago Explore how Red Canary fosters accessibility in its coding environment with intuitive interfaces, comprehensive documentation, community support, accessible features, and ongoing enhancements. Hilary Stohs-Krause
Halting a hospital ransomware attack(link is external) The Red Canary Blog: Information Security Insights 1 year ago Red Canary prevented a hospital from being breached. See how we stopped ransomware from enabling a catastrophic event. Brian Donohue