Ranking the top threats and techniques for the first half of 2025(link is external) The Red Canary Blog: Information Security Insights 1 day 6 hours ago Identity detections climbed, color birds swooped in, and two new cloud techniques broke into our top 10 in the first half of 2025 Brian Donohue
Red Canary CFP tracker: August 2025(link is external) The Red Canary Blog: Information Security Insights 2 days ago Red Canary's monthly roundup of upcoming security conferences and calls for papers (CFP) submission deadlines Shelley Moore
Here’s what you missed on Office Hours: July 2025(link is external) The Red Canary Blog: Information Security Insights 6 days 4 hours ago SIEMs, CleanUpLoader, FileFix, and npm packages: Catch up on the last month's episodes of Red Canary Office Hours.
Our favorite talks from fwd:cloudsec 2025(link is external) The Red Canary Blog: Information Security Insights 1 week ago Red Canary’s cloud security enthusiasts left fwd:cloudsec 2025 with some invaluable insights and community connections The Red Canary Team
Intelligence Insights: July 2025(link is external) The Red Canary Blog: Information Security Insights 1 week 6 days ago CleanUpLoader compromises, Poseidon Stealer debuts, and LummaC2 lives again in this month’s edition of Intelligence Insights The Red Canary Team
10 Black Hat talks we want to see in 2025(link is external) The Red Canary Blog: Information Security Insights 2 weeks ago Talks on bypassing SOCs and initial access—we scoured this year’s list of sessions at Black Hat to find 10 talks worth making time for. Chris Brook
A defender’s guide to initial access techniques(link is external) The Red Canary Blog: Information Security Insights 3 weeks 2 days ago Experts from Red Canary, MITRE ATT&CK® and Proofpoint explore the ways adversaries break in, including fake CAPTCHAs and social engineering. Susannah Clark Matt
The double-edged sword of MCP: Understanding the threat landscape for AI workflows(link is external) The Red Canary Blog: Information Security Insights 3 weeks 6 days ago We break down the cybersecurity landscape of Model Context Protocol (MCP) servers and agentic AI workflows, including monitoring advice Jesse Griggs
Announcing Red Canary MDR for Cisco Duo(link is external) The Red Canary Blog: Information Security Insights 4 weeks 2 days ago Pair Duo’s trusted access security with Red Canary’s 24/7 expert MDR to stop identity attacks before they disrupt your business. Kelly Horsford
Red Canary named a Leader in G2’s Summer 2025 MDR Reports — #1 in enterprise customer satisfaction(link is external) The Red Canary Blog: Information Security Insights 1 month ago A Leader in G2’s Summer 2025 Grid®, Enterprise Grid®, and Mid-Market Grid® Reports for MDR, Red Canary ranked #1 in enterprise customer satisfaction. Faith Wenger
Red Canary CFP tracker: July 2025(link is external) The Red Canary Blog: Information Security Insights 1 month ago Red Canary's monthly roundup of upcoming security conferences and calls for papers (CFP) submission deadlines Shelley Moore
Here’s what you missed on Office Hours: June 2025(link is external) The Red Canary Blog: Information Security Insights 1 month 1 week ago Mocha Manakin, malvertising, and social engineering trends: Catch up on the last month's episodes of Red Canary Office Hours.
Contain identity threats automatically with Red Canary and Microsoft Entra ID(link is external) The Red Canary Blog: Information Security Insights 1 month 1 week ago Red Canary’s expanded integration with Microsoft Entra ID facilitates rapid response to identity threats with help from expert AI agents Alex Spiliotes
Email bombs and fake CAPTCHAs: A social engineering survival guide(link is external) The Red Canary Blog: Information Security Insights 1 month 1 week ago Educate yourself and your organization's users about two increasingly popular social engineering schemes: email bombing and paste and run Red Canary Intelligence
Shape shifting: How to wrangle unpredictable data at scale(link is external) The Red Canary Blog: Information Security Insights 1 month 1 week ago Red Canary’s engineering team transforms petabytes of data from third-party vendors into a consistent, readable format for threat detection Ian Woodley
Intelligence Insights: June 2025(link is external) The Red Canary Blog: Information Security Insights 1 month 2 weeks ago Amber Albatross abides and a new color bird threat, Mocha Manakin, manifests in this month's edition of Intelligence Insights The Red Canary Team
Mocha Manakin delivers custom NodeJS backdoor via paste and run(link is external) The Red Canary Blog: Information Security Insights 1 month 2 weeks ago Named by Red Canary, Mocha Manakin uses paste and run with PowerShell to drop a custom NodeJS backdoor that could lead to ransomware Red Canary Intelligence
A large learning model: Red Canary’s AI journey(link is external) The Red Canary Blog: Information Security Insights 1 month 3 weeks ago Red Canary was experimenting with generative AI B.C. (before ChatGPT). Our new next-gen AI agents are the capstone of a years-long journey. Rafael Del Rey
All about that baseline: Detecting anomalies with Surveyor(link is external) The Red Canary Blog: Information Security Insights 2 months ago The Surveyor open source tool can help organizations establish a baseline of their environment, verify activity, and investigate anomalies. Tre Wilkins
Red Canary CFP tracker: June 2025(link is external) The Red Canary Blog: Information Security Insights 2 months ago Red Canary's monthly roundup of upcoming security conferences and calls for papers (CFP) submission deadlines Shelley Moore