Why Email Forwarding is a Security Risk (And How to Detect)
Threat actors use email forwarding rules to access mailboxes and leak data in BEC attacks. Know the risks and how to detect new email forwarding rules.
Read MoreHow To Detect Log4j Exploits That Lead To Ransomware
For opportunistic ransomware groups, Log4j is a low-hanging fruit to gain initial access into an environment. Learn how to detect Log4j exploits.
Read MoreHow To Detect Signs of Cuba Ransomware
Understand the methods that the Cuba variant uses to compromise victim systems and respond early enough to stop an attack in progress.
Read MoreHow To Detect AS-REP Roasting With Blumira
Based on a customer’s request, Blumira was able to create a detection built into platform to protect against AS-REP Roasting. Learn how.
Read MoreWhat To Log In A SIEM: Logging Best Practices
How do you know where to start when it comes to logging security events? We'll take you through 10 log sources you should prioritize in a SIEM.
Read MoreBest Practices For Configuring Firewall Rules
When securing down new or existing firewall rules, there are several best practices you should follow and ports you should almost always block
Read More