Search results for:
-
From Webshell to C2: The Evolution of Post-Exploitation and Covert Operations
From webshells to sophisticated post-exploitation frameworks, gain insights into the latest threat actor strategies and how defenders can stay ahead.
-
Brave the Storm: Surfing the Wake of Salt Typhoon and What We Can and Should Learn From It
2024 saw significant global events – from the Paris Olympics to medical breakthroughs – but it also brought concerning cyber incidents, particularly the Salt Typhoon attacks targeting U.S. telecom
-
Using NetWitness to Detect Phishing reCAPTCHA Campaign
By leveraging NetWitness Packets (NDR) and NetWitness Endpoint (EDR), the NetWitness Incident Response team demonstrates how organizations can detect stealthy reCAPTCHA phishing attacks before they ca
-
NetWitness Product Update: Exciting Innovations in the 12.5 Release
In our recent webinar, Arthur Fontaine, Director of Product Marketing at NetWitness, provided an exciting update on our latest product innovations, particularly focusing on the recent 12.5 release.
-
CVE-2024-24919 in NetWitness Network
A successful exploit of CVE-2024-4956 can have severe consequences for organizations relying on Check Point appliances for protection. Authors: Albert Priego Bravo, Massimiliano Faudarole.
-
The Sky Is Crying: The Wake of the 19 JUL 2024 CrowdStrike Content Update for Microsoft Windows and What We Should Remember and Take Away From It
Friday the 19th was a challenging day for many organizations, teams, and individuals worldwide. We can all agree that it was stressful, and the impacts are still being assessed. It will take some time
-
Adaptive Defense: Modernization of Cybersecurity Defense and Management Due to the Inevitable Convergence of IOT, OT and the Enterprise Environment
Introduction Much discussion has occurred in recent years concerning cybersecurity in and related to IOT and OT environments. Traditionally, these areas of concern have been largely kept separate from
-
Black Hat Asia 2024: Day One
NetWitness is happy to be part of the NOC again for another global event by Black Hat in Singapore. The Black Hat Network Operations Center (NOC) delivers a secure, reliable network in one of the most
-
Network Optimization with Packet Capture Tools
When networks chatter, packet capture listens. It’s the tech wizardry that grabs and stores data zipping across your network—vital for security pros and IT gurus to troubleshoot threats or cat
-
The Future of Attack Surface Management: Emerging Trends and Technologies
Taking proactive steps to defend digital assets is key in today’s cybersecurity world. Attack Surface Management, a critical practice, involves identifying and managing points of exposure to cyb