Anatomy of the SolarWinds Attack: Five Types of Malware
The term “malware” (short for “Malicious Software”) describes the software that is used to compromise or cause damage to a system or network. Essentially, malware is code w...
Read MoreProduct Update: New Microsoft Sysmon Security Rules
To help you monitor your Microsoft Windows security, Blumira’s incident detection team has released a number of new Sysmon security detection rules to help identify potential att...
Read MoreDefending Against Active Directory Kerberos Attacks
Much has been written by pentesting and red teams to explain how to leverage attacks against the Kerberos protocol to quickly escalate privileges and take over service accounts wit...
Read MoreBlumira in the News: January-February 2021
It's been a very busy 2021 so far, and you might have missed where Blumira has been mentioned in the news these days. While not at all an exhaustive list, here's a few of the more ...
Read MoreComparing the Cost of a Ransomware Attack vs. a Cloud SIEM
How much could a ransomware data breach cost your company compared to implementing a detection and response solution that can help you prevent, detect and respond to ransomware att...
Read MoreSo You Failed Your Pentest, Now What?
There are multiple reasons why an organization fails a penetration test (a simulated attack on an organization's computer systems to check for security gaps and vulnerabilities) an...
Read More