Blog

Counter Identity-Driven Threats With Identity Analytics and Intelligence

Published on July 24, 2019

By Abhishek RVRK Sharma, Senior Technical Marketing Engineer at Securonix   Mitigate a Major Cause of Data Breaches Identities have traditionally been managed with dedicated identity management software. That made sense when enterprise applications were on-premise, in secure data centers whose keys were only handed over to trusted agencies. Enterprise...

The Anatomy of a Modern SIEM

Published on July 15, 2019

By Abhishek Sharma, Senior Technical Marketing Engineer at Securonix The 8 Critical Features of a Modern SIEM The cybersecurity landscape is getting more complex. Hackers continue to innovate, and business technologies generate increasing amounts of data. This is making legacy security information and event management (SIEM) solutions obsolete as they...

Security as a Service? Making managing a complex threat environment look easy.

Published on June 26, 2019

Intellyx BrainBlog for Securonix by Jason English Comprehensive, proactive, responsive security practices were once the exclusive realm of larger companies and government institutions, with the capital and personnel to invest in running SecOps control rooms staffed with security experts. Fortunately, those centralized control days are long gone. We are erasing...

Solve Your Healthcare Security Challenge Using Next-Gen SIEM

Published on June 3, 2019

Healthcare organizations are aware of the extremely sensitive nature of, and consequently the importance of, protecting patient data. Due to the value of personal health information (PHI), healthcare security is under attack from both external and internal threats. External attackers, drawn by the monetary value of PHI, employ increasingly sophisticated...

Securonix Threat Research: Detecting LockerGoga Targeted IT/OT Cyber Sabotage/Ransomware Attacks

Published on April 9, 2019

By Oleg Kolesnikov and Harshvardhan Parashar, Securonix Threat Research Team Updated April 30, 2019   Figure 1: LockerGoga Targeted Malicious Cyber Sabotage/Ransomware Implant in Action   Introduction The Securonix Threat Research Team has been closely monitoring the LockerGoga targeted cyber sabotage/ransomware (TC/R) attacks impacting Norsk Hydro (one of the largest...

Passwort Manager: Ein nicht ganz fehlerfreies, aber notwendiges Tool

Published on April 4, 2019

von Anjola Adeniyi, securonix   Heutzutage hat so gut wie jeder eine kaum noch überschaubare Zahl verschiedener Online-Konten. Jedes einzelne von ihnen ist an sensible Daten wie Bank- und Kontoinformationen oder Adressdaten gebunden. Wer einigermaßen sicherheitsbewusst ist, der benutzt Passwort-Manager um die Zugangsdaten zu diesen Konten sicher zu speichern. Ein...

Threat Hunting Architecture

Published on March 27, 2019

By Rohit D. Sadgune, Senior Security Solution Engineer, Securonix   Introduction Threat hunting is an essential skill for organizations with mature security operations centers. In this blog I will lay out an essential framework for the two different classifications of threat hunting as well as several threat hunting models that...

Why accurate attack attribution is critical in cybersecurity

Published on February 22, 2019

  By Igor Baikalov, chief scientist at Securonix   Read this article on SC Magazine UK   The Internet favours anonymity by design. Despite being an obvious boon to cybercriminals and terrorists, anonymity has long been touted to be a worthy price to pay for supporting the foundations of democracy: privacy...

Securonix Threat Research: Detecting Persistent Cloud Infrastructure/Hadoop/YARN Attacks Using Security Analytics: Moanacroner, XBash, and Others

Published on January 24, 2019

By Oleg Kolesnikov and Harshvardhan Parashar, Securonix Threat Research Team   Figure 1: Moanacroner Establishes Persistence After Initial Cloud YARN/Hadoop Infection Using Crontabs   Introduction In recent months, we have been observing an increase in the number of automated attacks targeting exposed cloud infrastructure/Hadoop/YARN instances. Some of the attacks we...

The Top Seven Cybersecurity Horrors

Published on October 31, 2018

…and how to protect yourself It’s Halloween! And before the night exposes the horrors from the netherworld, most of us still have to get through the wacky costumes at work. Just the same, the cybersecurity demons do not slow down, and our SOC superheroes must continue to save the world...