Search results for:
-
Using NetWitness to Detect Phishing reCAPTCHA Campaign
By leveraging NetWitness Packets (NDR) and NetWitness Endpoint (EDR), the NetWitness Incident Response team demonstrates how organizations can detect stealthy reCAPTCHA phishing attacks before they ca
-
NetWitness Product Update: Exciting Innovations in the 12.5 Release
In our recent webinar, Arthur Fontaine, Director of Product Marketing at NetWitness, provided an exciting update on our latest product innovations, particularly focusing on the recent 12.5 release.
-
CVE-2024-24919 in NetWitness Network
A successful exploit of CVE-2024-4956 can have severe consequences for organizations relying on Check Point appliances for protection. Authors: Albert Priego Bravo, Massimiliano Faudarole.
-
The Sky Is Crying: The Wake of the 19 JUL 2024 CrowdStrike Content Update for Microsoft Windows and What We Should Remember and Take Away From It
Friday the 19th was a challenging day for many organizations, teams, and individuals worldwide. We can all agree that it was stressful, and the impacts are still being assessed. It will take some time
-
Adaptive Defense: Modernization of Cybersecurity Defense and Management Due to the Inevitable Convergence of IOT, OT and the Enterprise Environment
Introduction Much discussion has occurred in recent years concerning cybersecurity in and related to IOT and OT environments. Traditionally, these areas of concern have been largely kept separate from
-
Black Hat Asia 2024: Day One
NetWitness is happy to be part of the NOC again for another global event by Black Hat in Singapore. The Black Hat Network Operations Center (NOC) delivers a secure, reliable network in one of the most
-
Network Optimization with Packet Capture Tools
When networks chatter, packet capture listens. It’s the tech wizardry that grabs and stores data zipping across your network—vital for security pros and IT gurus to troubleshoot threats or cat
-
The Future of Attack Surface Management: Emerging Trends and Technologies
Taking proactive steps to defend digital assets is key in today’s cybersecurity world. Attack Surface Management, a critical practice, involves identifying and managing points of exposure to cyb
-
Indicators of Compromise: A Comprehensive Guide to IOCs in Threat Detection and Response
The term “Indicators of Compromise” refers to artifacts or pieces of data that provide evidence that a security incident may have occurred or is ongoing. These indicators act as red flags,
-
Unveiling the Future of Network Security: SASE vs SSE
Since cybersecurity is an ever-evolving field, staying abreast of cutting-edge technologies and frameworks is necessary for organizations aiming to strengthen their defenses against an array of threat