Published: 19th February
Fusing advanced threat detection technologies with deep forensic expertise, we help you join all the dots to rapidly distel threats. Our innovative solutions give you all the confidence and proactive control you need – whatever comes your way.
We’re here to help you keep your people and your reputation safe. It’s what we do for companies around the world every day.
With Cyberseer, you’re no longer on your own.
Within this threat findings report we detail some example anomalies detected in customer’s operational environments, where Cyberseer prevented or limited the damage these cyber threats can inflict. Informing customers about relevant threats as early as possible gives them the best chance to proactively address security weaknesses and take actions to prevent data loss, brand damage or system failure.
Complete the short form below to gain access to the full threat findings report.
Published: 29th June
Hover over each tactic heading to reveal data source & technique:
Initial Access consists of techniques that use various entry vectors to gain their initial foothold within a network.
DATA SOURCES
• Application Log Content
• File Creation
• Network Connection Creation
• Network Traffic Content
• Process Creation
• Application Log Content
• Network Traffic Flow
• Logon Session Creation
• User Account Authentication
MITRE Techniques
•T1566 Phishing
•T1078 Valid Accounts
Execution consists of techniques that result in adversary-controlled code running on a local or remote system.
DATA SOURCES
MITRE Techniques
Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network.
DATA SOURCES
MITRE Techniques
Credential Access consists of techniques for stealing credentials like account names and passwords.
DATA SOURCES
MITRE Techniques
Discovery consists of techniques an adversary may use to gain knowledge about the system and internal network.
DATA SOURCES
MITRE Techniques
Lateral Movement consists of techniques that adversaries use to enter and control remote systems on a network.
DATA SOURCES
MITRE Techniques
Exfiltration consists of techniques that adversaries may use to steal data from your network.
DATA SOURCES
MITRE Techniques
Published: 15th February
In this report, Cyberseer reviews the issues of 2020:
During 2020, there was monumental change both within organisations and how consumers interact with these organisations. Within this paper we review how you can secure the cloud, the remote workforce (those users connecting to the cloud), how cybercrime has taken advantage of COVID-19 and the increased number of attacks on supply chain security. Complete the short form below to gain access to the full report.