The Hedgehog Defense #2: Defend Against Automatically Mounted Disk Images
Learn how threat actors abuse a default Windows feature to trick users into running malicious software and what you can do to protect your environment.
Read MoreGetting Started with Sysmon: Configuration and Best Practices
Unlock deeper insights into Windows system activity with Sysmon. Learn how to balance detailed logging with your security needs.
Read MoreReal-World Examples of Detecting Attacks with Sysmon
Learn how Sysmon's detailed logging of system, process and command line activity reveals threats that bypass standard Windows logging.
Read MoreUncover Threats in Your Windows Environment with Sysmon
Sysmon provides critical visibility into Windows systems activity. Learn how it works and why you need it in this comprehensive guide.
Read MoreHow To Detect SYSVOL Enumeration Exploits
Attackers can gain unauthorized access to the domain via a SYSVOL exploit. Learn ways to detect these exploits and stop an attack in progress.
Read MoreNew Detections for Microsoft 365 & Windows
Our latest rules detect insecure user activity, potentially malicious logins, security misconfigurations and more in Microsoft 365 and Windows.
Read MorePrintNightmare (CVE-2021-1675 and CVE 2021-34527) Explained
Proof-of-concept exploit code was published on Github on June 29, 2021 for a vulnerability (CVE-2021-1675) in Print Spooler.
Read MoreHow Blumira Helped Fechheimer Evade a HAFNIUM Exchange Attack
Blumira's customer, Fechheimer, was able to successfully evade a Microsoft Exchange attack. Learn how Blumira helped them to detect the incident early.
Read MoreHow Blumira Responded to a Real Exchange Attack
A Blumira customer was able to detect a Microsoft Exchange attack. Learn how an MSP and Blumira worked together to respond to the incident.
Read MoreDefending Against AD Kerberos Attacks
Defend against Active Directory Kerberos attacks with Blumira's advanced cybersecurity solutions. Protect your organization's critical assets today.
Read More