All
timm

The importance of monitoring Windows 10 updates

Microsoft has redone their release cycle format, and although it makes things easier for the end user, it can prove difficult to ensure your...

joanna

Five ways Plixer Scrutinizer helps retail networks

Even though most of us have looked at a calendar recently and thought, “I could have sworn we were in May, not October,” you...

jake

Detecting RDP attacks with NetFlow and metadata

An ever increasing attack vector in the healthcare industry are attacks against open or unsecured RDP connections that allow a bad actor to gain...

briand

Username reporting: NetFlow integration with Splunk

I was recently able to explore the Splunk software development kit with a customer. This helped me to implement another way to get username...

scottr

How to detect suspicious ICMP traffic

A few years ago, we added a behavioral algorithm to Plixer Scrutinizer that looked at all the flow data that was collected and determined...

khalil

How to detect a reverse SSH tunnel

Today we are going to talk about Plixer’s new Flow Analytics algorithm, Reverse SSH Shell, which has been included in the latest Plixer Scrutinizer...

dylan

STIX/TAXII for threat intelligence

What is STIX/TAXII? STIX stands for Structured Threat Information Expression, which is an open-source language and serialization format used in sharing threat intelligence. Think...

stephen

First look: Plixer’s machine learning engine explained

The purpose of this blog is to de-mystify the hype around machine learning (ML) by exploring three topics: What kind of ML is Plixer...