STR_logo@2x

Mission Statement

Our ongoing mission is to monitor the constantly-shifting threat landscape, conducting security investigations and developing detection methods for the latest real-world cyberattacks.

We provide advanced security expertise for our customer’s security operations, including threat hunting and incident response. We also share our expertise with the wider community through Threat Research Reports in order to help you better understand, detect, and protect yourself against the latest real-world cyberattacks.

str_illus@2x

Latest in Securonix Threat Research

Securing Your Remote Workforce – Detecting Teleconferencing Tools Attacks in the Work-From- Home (WFH) World – Part 2

The Securonix Threat Research team has recently been observing a number of new attacks/security issues reported involving different remote workforce teleconferencing applications (TA), including Zoom, Cisco Webex, and Microsoft Teams. Some examples of the attacks/exploits reported include Zoom UNC path exploits, Zoom and Webex phishing, new high-profile Zoom zero-day exploits, Cisco Webex remote code-execution (RCE) vulnerability, Microsoft Teams GIF subdomain/account takeover, and a number of other attacks/issues.

The Securonix Threat Research Team has been actively investigating and closely monitoring these cyberattacks/security issues to help organizations better protect themselves in light of the global shift to remote workforce/teleconferencing work. In this report is a summary of the key details with our recommendations, including details about the recommended log/data sources and priority use cases that you can use to improve your remote workforce TA monitoring, including Zoom, Webex, and others.

Threat Research

Securing Your Remote Workforce – Detecting the Latest Cyberattacks in the Work-From-Home (WFH) World: Part 1

Read More

Threat Research

Detecting High-Impact Targeted Cloud/MSP $14M+ Ryuk and REvil Ransomware Attacks

Read More

Threat Research

Detecting LockerGoga Targeted IT/OT Cyber Sabotage/Ransomware Attacks

Read More

Threat Research

Detecting Persistent Cloud Infrastructure/Hadoop/YARN Attacks Using Security Analytics: Moanacroner, XBash

Read More