
How to detect lateral movement with the Plixer Platform
If you are familiar with the MITRE ATT&CK framework, then you know most attackers will follow a general sequence of steps in order to carry
If you are familiar with the MITRE ATT&CK framework, then you know most attackers will follow a general sequence of steps in order to carry
Sophisticated attacks continue to grow and breach organizational defenses and they do so without being detected. Traditional attacks use straightforward methods, such as weaponizing emails in
It’s fall here on the east coast of the US and that means a few things. First is that the weather and leaves start changing
Endpoint agents and logs often play an important role in securing your organization. That said, despite the investment of millions into endpoint agents, IDS/IPS, and
We’ve seen the best-of-breed or single-vendor platform debate unfold for many years. On one hand, you have niche solutions providing a focused approach to cybersecurity.
It’s safe to say organizations have had their fair share of cyber attacks this past year—from threats discovered early last year with VMware (CVE-2021-21985 and CVE-2021-21972), which provided
When tools that were created to help security teams simulate attacks are used by the attackers, you know there’s a problem. But that’s exactly what’s happened in
Businesses are seeing a 50% increase in cyberattacks per week. That’s according to a report from Check Point Research, where companies reported a bump in cyberattacks
Threats today continue to endanger the security of the enterprise at an alarming rate. In fact, a recent report by Positive Technologies found that cybercriminals can
Increasingly complex cyber threats are pushing SOC analysts to ‘up their game’. It has become critical to quickly understand how an attacker has gained access, what
68 Main St Ste 4
Kennebunk, ME 04043
© 1999 – 2023 Copyright Plixer, LLC. All rights reserved. Terms of Use | Online Privacy Policy