Resource Hub
Dive deep into the realm of cybersecurity with our expert insights on Managed Detection and Response, Incident Response, Endpoint and Cloud Security, and more. Stay updated with the latest enhancements of the UnderDefense MAXI platform. Discover our trailblazing achievements and let our satisfied customers inspire you with their stories.
How to Detect CobaltStrike Command & Control Communication
CobaltStrike became part of the Cybercrime’s “toolset” almost in every Company breach. This growth...
Detecting DGA Domains: Machine Learning Approach
In this post we are going to take a look at Domain Generation Algorithms (DGA) and an interesting...
How to protect from COVID-19 Cyber Attacks
It is not new that COVID-19 pandemic influenced the lives of humanity in the XXI century. However,...
Global Car Manufacturer Incident Forensics and Response
Our client engineers, manufactures and markets the world’s best-selling all-electric vehicle in history…
Detecting reconnaissance activity in your network
By Bogdan Vennyk One of the main services we provide at UnderDefense is 24×7 Monitoring with our...
Incident response for healthcare on blockchain company case study
A global healthcare company that is focused on innovating the healthcare system…
N-day exploit development and upgrade to RCE
[CVE-2018-6231] Trend Micro Smart Protection Server Bypass Vulnerability + Code Execution By Taras...
Threat & Fraud detection with Splunk
Client:#1 National Telecommunications and Internet Technologies provider Technical...
Web Application Penetration Testing
Client:International Marketing Service Firm Challenge:Client data security and Compliance...
Forwarding MySQL log file in AWS to Splunk: monitoring connections
Intro Working for our client with a database hosted on Amazon, we have faced the case of...