Remote Desktop Application vs MSTSC Forensics: The RDP Artifacts You Might Be Missing
Many threat actors utilize Remote Desktop Protocol (RDP) to move laterally within an environment once they have compromised it. There has been quite a bit of documentation around forensic artifacts associated with the Microsoft MSTSC client which has been around since 1998. However, there is also...
MFA Bypass Attacks: Why MFA is Not a CYA
The volume and sophistication of phishing attacks is at an all-time high. One of the most highly recommended security controls for preventing unauthorized access is multi-factor authentication (MFA), which can add an important layer of security beyond a traditional password. It com...
A Getting Started Guide to Veracode DAST Essentials
The Critical of Role of Dynamic Application Security Testing (DAST) Web applications are one of the most common vectors for attacks, accounting for over 40% of breaches, according to Verizon's Data Breach Report. Dynamic application security testing (DAST) is a crucial technique used b...
Generative AI: The latest example of systems of insight
It’s safe to say that Generative AI and the launch of GPT4 caused the most excitement – and fear – in technology in 2023. It’s not surprising with its possible areas of application and ease of use. Even schoolchildren are using it! It’s been the main topic of conversation at major tech conferenc...
Why is PCI DSS Compliance Important?
PCI DSS compliance protects cardholder data, maintains customer trust, and avoids financial penalties. In today’s digital era, as most financial transactions occur online, safeguarding cardholder information is paramount. The Payment Card Industry Data Security Standard (PCI DSS) outli...
Guardian Air: When Protecting Wireless Environments Is a Priority
It’s been a while since Wi-Fi was a novel technology in computer networking. You might remember a Linksys black and blue “router” with 54 Mbps speeds, which was lighting fast back in the day. Since then, 20 years have passed from the introduction of 802.11g (54 Mbps) to now, a world where Wi-Fi i...
Why SaaS SIEM? A Comprehensive Guide for Businesses
Today’s businesses are increasingly reliant on technology, meaning the importance of airtight cybersecurity cannot be overstated. As organizations navigate the complexities of the modern digital ecosystem, maintaining the integrity of their systems has become more than just a “nice to have,” but ...
Detecting Volt Typhoon TTPs – Security Spotlight
The “Security Spotlight” blog series provides insight into emerging cyberthreats and shares tips for how you can leverage LogRhythm’s security tools, services, and out-of-the-box content to defend against attacks. Last week, the Cybersecurity and Infrastructure Security Agency (CISA) released a ...
How to Maintain Network Visibility During an Infrastructure Upgrade to 40G
Major network speed upgrades demand major infrastructure upgrades. These infrastructure upgrades can include new cabling, new transceivers, or new hardware altogether. It’s an involved process, that can require tearing down your network to the studs. During this process, it’s easy for details to ...
Sarah Cleveland Talks Network Visibility, Zero Trust, and More with Federal News Network
Federal News Network hosted another successful Industry Exchange Cyber event in late January, where ExtraHop Senior Strategic Advisor, Sarah Cleveland, joined experts from iProov, Cisco, and Dakota State University to discuss cybersecurity in the public sector with Tom Temin, host of Th...
Upcoming Webinars, Workshops, Events & more
Date: 07 March 2024, 17:00
Date: 13 March 2024, 09:00
Althoff Grandhotel Schloss Bensberg
Date: 17 April 2024, 00:00