Blog Archive

Wednesday May 15, 2019
The top 10 cyber hygiene issues that lead to a breach: Part one — A perimeter in ruins
Max Heinemeyer, Director of Threat Hunting
Tuesday April 23, 2019
Software as a Security nightmare: The risks of collaboration in the cloud
Justin Fier, Director of Cyber Intelligence & Analytics
Tuesday March 26, 2019
Anatomy of an insider breach originating from a contractor's laptop
Keith Siepel, IT Manager at Hydrotech, Inc. (Guest Contributor)
Thursday March 21, 2019
Thwarting an invisible threat: How AI sniffs out the Ursnif trojan
Max Heinemeyer, Director of Threat Hunting
Tuesday March 12, 2019
A security analyst’s view: Detecting and investigating lateral movement with Darktrace
Tyler Fornes, Senior Security Analyst at Expel (Guest Contributor)
Tuesday March 5, 2019
Solving the “VR Goldilocks Problem” in Security Operations
Jon Hawes, Head of Detect and Security Innovation at Photobox Group Security, and Max Heinemeyer, Director of Threat Hunting at Darktrace
Friday February 15, 2019
Catching Mimikatz’ behavior with anomaly detection
Max Heinemeyer, Director of Threat Hunting
Friday February 8, 2019
AI reveals 2018’s biggest cyber-threats: Part two — to err is human
Max Heinemeyer, Director of Threat Hunting
Monday February 4, 2019
Anatomy of a zero-day trojan caught by our Darktrace appliance
Keith Siepel, IT Manager at Hydrotech, Inc. (Guest Contributor)
Monday January 28, 2019
AI reveals 2018’s biggest cyber-threats: Part one — the rise of nontraditional IT
Max Heinemeyer, Director of Threat Hunting
Thursday January 10, 2019
Glimpsing inside the trojan horse: An insider analysis of Emotet
Max Heinemeyer, Director of Threat Hunting
Monday December 3, 2018
Flying under the radar: How Darktrace detects ‘low and slow’ cyber-attacks
Dave Palmer, Director of Technology
Thursday October 4, 2018
Troubled waters: Cyber-attacks on San Diego and Barcelona’s ports
Andrew Tsonchev, Director of Technology, Darktrace Industrial
Monday August 20, 2018
Healthcare beware: Crypto-mining, malware, and IoT attacks
Dave Palmer, Director of Technology, Darktrace
Monday July 16, 2018
Trusting the cloud: Unencrypted data upload by government body
Max Heinemeyer, Director of Threat Hunting
Friday June 22, 2018
Beyond the hash: How unsupervised machine learning unlocks the true power of JA3
Max Heinemeyer, Director of Threat Hunting
Monday April 16, 2018
How profitable is crypto-mining malware?
Max Heinemeyer, Director of Threat Hunting
Wednesday March 7, 2018
How malware abused Sixt.com and Breitling.com for covert Command & Control communication
Max Heinemeyer, Director of Threat Hunting
Tuesday February 13, 2018
Cryptocurrencies and the future of cyber defense
Max Heinemeyer, Director of Threat Hunting
Friday February 2, 2018
Machine vs machine: instant domain fluxing identification with Darktrace
Max Heinemeyer, Director of Threat Hunting
Monday January 22, 2018
The implications of TRITON for the future of ICS security
Andrew Tsonchev, Director of Technology, Darktrace Industrial