Carter Foster

Map of decoy dog attacks

How Network Data Allows You To Detect DNS Attacks Like The “Decoy Dog” Exploit

In today’s complex cybersecurity landscape, the battle between hackers and defenders is a continuous chess match. Recent revelations about the “Decoy Dog” exploit have demonstrated the value of metadata in understanding and mitigating these evolving threats. For those keen to delve deeper into this threat landscape, I recommend downloading our recent white paper titled “Understanding …

How Network Data Allows You To Detect DNS Attacks Like The “Decoy Dog” Exploit Read More »

Why Other NDR Solutions Are So Expensive

If you started to research NDR solutions to any degree, you’ve likely noticed that most vendors use packet infrastructure to monitor, ingest, and analyze traffic for threat activity. Packet analysis is a very popular threat detection method, but it has shortcomings that may not seem obvious at first glance.   For starters, deploying packet infrastructure is …

Why Other NDR Solutions Are So Expensive Read More »

julian hochgesang yvquoxk unsplash

How to detect lateral movement with the Plixer Platform

If you are familiar with the MITRE ATT&CK framework, then you know most attackers will follow a general sequence of steps in order to carry out an attack. It’s typically along the lines of gaining entry, performing recon, moving to vulnerable targets, doing bad things, and exfiltrating data.

annie spratt AFBSkibuk unsplash

How to map MITRE ATT&CK® with Plixer NDR

Sophisticated attacks continue to grow and breach organizational defenses, and they do so without being detected.  Traditional attacks use straightforward methods, such as weaponizing emails in phishing attacks, which direct the victim to a bad domain where malicious actors can compromise or steal important information. If security teams in the organization can detect and identify such …

How to map MITRE ATT&CK® with Plixer NDR Read More »