How to detect CobaltStrike Command & Control communication

How to detect CobaltStrike Command & Control communication

How to detect CobaltStrike Command & Control communication By Bogdan Vennyk CobaltStrike became part of the Cybercrime’s “toolset” almost in every Company breach. This growth is explained by the fact that CobaltStrike was leaked multiple times and became more...
Detecting DGA domains: Machine Learning approach

Detecting DGA domains: Machine Learning approach

Detecting DGA domains: Machine Learning approach By Alexander Ragulin In this post we are going to take a look at Domain Generation Algorithms (DGA) and an interesting way to detect them with the help of Deep Learning (LSTM neural net, to be precise). DGA domains are...
UnderDefense becomes a member of MPN (Microsoft Partner Network)

UnderDefense becomes a member of MPN (Microsoft Partner Network)

UnderDefense enters strategic partnership with Microsoft Azure Companies in various industries increasingly choose cloud as a primary location to store data or plan to migrate to the cloud. Such infrastructure is much more flexible for data modernization and analysis....
Risk-based cyber resiliency

Risk-based cyber resiliency

Risk-based cyber resiliency Customer view:Guest blog by Michael Rezek, VP, Cybersecurity Strategy at Accedian It’s may be possible to spend less on cybersecurity and get more protection What we have witnessed over the last couple of decades as the traditional approach...

Pin It on Pinterest