Blog

30 Results / Page 1 of 4

How Cyberseer detect Burpsuite using the Darktrace

today6 August 2020

  • 527
  • 1
  • 1
Featuredstar
close

Blog Elizabeth Gladen

How Cyberseer detect Burpsuite using Darktrace

How Cyberseer detect Burpsuite using Darktrace Published: 5th August Burpsuite is a graphical tool for testing Web application security and vulnerabilities that can be used for penetration testing. It’s a framework which allows an adversary not only to carry out reconnaissance but also gives them the ability to intercept and ...

Cyberseer threat findings report

today19 February 2021

  • 505
  • 1
Featuredstar
close

Resources + Blog Elizabeth Gladen

Cyberseer Threat Findings Report

Cyberseer Threat Findings Report Published: 19th February Keeping your business safe is your number one priority. It’s ours too. Fusing advanced threat detection technologies with deep forensic expertise, we help you join all the dots to rapidly distel threats. Our innovative solutions give you all the confidence and proactive control ...

XDR whats the benefit

today12 August 2021

  • 663
close

Blog Elizabeth Gladen

XDR – What is the benefit?

XDR – What is the Benefit? Published: 12th August Let’s face it, it’s a tough gig for CISOs and security teams right now. With an explosion of traffic from new and evolving sources; corporate estates that are sprawling and fragmented; and hackers who have upped their game – it’s not ...

Discoveries made by the Cyberseer SOC

today8 July 2020

  • 244
  • 6
close

Blog Elizabeth Gladen

Discoveries made by the Cyberseer SOC

Discoveries made by the Cyberseer SOC Published: 8th July RIG Exploit Kit (RigEK) Industry Sector: Financial Threat source: External Cyberseer utilises machine learning models to detect a device behaving abnormally. Analysts monitoring for this activity discovered a corporate device beaconing to a newly generated domain. The suspect device was being ...

Google Chronicle: solving the three main security data challenges that enterprises face today

today13 August 2020

  • 499
close

Blog Elizabeth Gladen

Google Chronicle: solving the three main security data challenges

Google Chronicle: solving the three main security data challenges that enterprises face today Published: 10th August Google Chronicle solves the three main security data challenges that enterprises face today. Those of scalability, visibility and cost. With a multitude of security solutions being deployed within an enterprise, the rich security telemetry ...

Detecting Dridex without Signatures

today15 March 2016

  • 635
close

Blog Elizabeth Gladen

Detecting Dridex without Signatures

Detecting Dridex without Signatures Cyberseer deploy advanced threat detection solutions as part of its managed security services, across a range of businesses and industries. Recently, one of Cyberseer’s clients was hit with a phishing campaign aiming to plant the Dridex malware within its network.  While the client’s e-mail gateway blocked ...

Cyberseer – Detecting & Stopping a Remote Access Scam

today16 October 2018

  • 977
close

Blog Elizabeth Gladen

Detecting & Stopping a Remote Access Scam

Detecting & Stopping a Remote Access Scam Technical support and remote access scams aren’t exactly a new concept, they have been observed since as early as 2008. The premise is simple, the scammer cold calls the victim posing as a legitimate-sounding third-party, with a name such as “Microsoft” or “Windows Technical ...

Infographic Five ways to boost your threat detection capability and capacity

today11 May 2021

  • 254
  • 1
  • 1
Featuredstar
close

Blog + Infographic Elizabeth Gladen

Infographic – The Threat From Within: Five steps to boost your threat detection

Infographic: Threats From Within: Five Ways to Boost Your Detection Capability & Capacity This infographic explores five ways to boost your detection capability and capacity: Know what to look for Employ zero trust Bring in the big guns Focus on reducing time to detection Get real-time threat detection For more ...

These advanced technologies power our MSSP SOC Service offering: