Red Canary

Infosec products of the month: March 2025

Infosec products of the month: March 2025 2025-03-28 at 06:36 By Help Net Security Here’s a look at the most interesting products from the past month, featuring releases from: 1Kosmos, Alloy, Cloudflare, Cytex, Detectify, GetReal Security, iProov, Keysight Technologies, Outpost24, Palo Alto Networks, Pondurance, Red Canary, SailPoint, SimSpace, Sonatype, Sumsub, and TXOne Networks. Outpost24 introduces […]

React to this headline:

Loading spinner

Infosec products of the month: March 2025 Read More »

New infosec products of the week: March 7, 2025

New infosec products of the week: March 7, 2025 2025-03-07 at 06:01 By Help Net Security Here’s a look at the most interesting products from the past week, featuring releases from Outpost24, Palo Alto Networks, Red Canary, and Sonatype. Outpost24 introduces CyberFlex to streamline attack surface management and pen testing Outpost24 has launched Outpost24 CyberFlex,

React to this headline:

Loading spinner

New infosec products of the week: March 7, 2025 Read More »

Red Canary expands Security Data Lake to help organizations optimize their SIEM costs

Red Canary expands Security Data Lake to help organizations optimize their SIEM costs 2025-03-04 at 16:50 By Industry News Red Canary announced new capabilities for Red Canary Security Data Lake, a service that enables IT and security teams to store, search, and access large volumes of infrequently accessed logs—such as firewall, DNS, and SASE data—without

React to this headline:

Loading spinner

Red Canary expands Security Data Lake to help organizations optimize their SIEM costs Read More »

Organizations are making email more secure, and it’s paying off

Organizations are making email more secure, and it’s paying off 2024-09-25 at 06:01 By Help Net Security Compromised identities have been a central component of countless costly breaches this year, according to Red Canary. Rise in identity and cloud-native attacks While most of the threats and techniques identified in the 2024 report remain consistent with

React to this headline:

Loading spinner

Organizations are making email more secure, and it’s paying off Read More »

Key MITRE ATT&CK techniques used by cyber attackers

Key MITRE ATT&CK techniques used by cyber attackers 2024-03-15 at 11:01 By Help Net Security While the threat landscape continues to shift and evolve, attackers’ motivations do not, according to a Red Canary report. The classic tools and techniques adversaries deploy remain consistent–with some notable exceptions. The report tracked MITRE ATT&CK techniques that adversaries abuse

React to this headline:

Loading spinner

Key MITRE ATT&CK techniques used by cyber attackers Read More »

Short-term AWS access tokens allow attackers to linger for a longer while

Short-term AWS access tokens allow attackers to linger for a longer while 07/12/2023 at 17:32 By Zeljka Zorz Attackers usually gain access to an organization’s cloud assets by leveraging compromised user access tokens obtained via phishing, by using malware, or by finding them in public code repositories. These are long-term access tokens associated with an

React to this headline:

Loading spinner

Short-term AWS access tokens allow attackers to linger for a longer while Read More »

Scroll to Top