AV vs EDR: An Introduction to Antivirus Bypass 

Cyber attackers use sneaky tricks to evade detection. This post reviews the classes of attacks that bypass detection. We often interact with customers that are a bit puzzled by what we do.  They already have a cybersecurity software on their endpoint, an AV and a firewall. Why would they need anything more? Preventive vs Detective

By |2021-02-22T10:27:55-05:00February 16th, 2021|Cybersecurity, Security Analysis, Threat Hunting|

A $100,000 Save Made by Detecting Emotet

The malware known as Emotet is back in action. Now, it’s more malicious than ever. It’s estimated that 7% of global organizations have been subject to Emotet. One of CYDEF’s managed detection and response clients was one of them. Fortunately, our team of analysts detected unusual activity associated with the attack before damage was

By |2021-02-16T12:13:14-05:00January 25th, 2021|Security Analysis, Threat Hunting|

Tracking Cyber Exposure

Tracking cyber exposure requires detailed investigation to understand how a network has been breached and what data has been exposed to attackers. The following post explains how CYDEF investigates cyber exposure using our proprietary tool, SMART-Sentinel. 2020: Ending with a Surge of Breaches In the final months of 2020, global networks were inundated by a

By |2021-01-14T14:10:32-05:00December 31st, 2020|Security Analysis, Threat Hunting|

Cyber Security Predictions 2021

CYDEF’s cyber security predictions for 2021, including ransomware expectations, cloud-based software risks, and budget impacts on cyber protection. CYDEF’s Cyber Security Predictions 2021 Around the new year, it seems blogs either are reviewing the year that’s ending or predicting the events of the coming year. I decided to try my hand at predicting the future.

By |2021-01-11T15:00:03-05:00December 31st, 2020|Cybersecurity, Predictions, Security Analysis|

Adrozek Silently Alters Search Results in Web Browsers

Adrozek, a drive by download attack, may be impacting your business’s browsers. From desktops to laptops to mobile devices, your endpoint security should be assessed. Detecting Adrozek’s Malicious Adware On December 10th, 2020, Microsoft announced detection of the malicious adware Adrozek on a variety of browsers, including Microsoft Edge, Google Chrome, Yandex Browser, and Mozilla

By |2020-12-22T17:21:48-05:00December 17th, 2020|Security Analysis, Threat Hunting|

Risk Management: The Strongest Cybersecurity Tactic

Prevention is Not the (Only) Cure Risk management is the strongest cybersecurity tactic, outweighing the roles of prevention and detection. Our clients often indicate they’re looking for a solution that detects and blocks threats, while preventing infection. This may seem perfectly natural upon first glance. After all, what’s the point of detecting malware once your network is infected? An

By |2020-12-10T15:38:37-05:00December 10th, 2020|Security Analysis, Threat Hunting|

Defence in Depth as a Cyber Risk Prevention Tactic

On the Relationship Between Cheese and Risk In cybersecurity, there is a lot of talk of “defence in depth”, but sometimes it is unclear what people mean… or why you should care. This post answers questions about the concept of “defence in depth”, with unexpected help from a famous cheese family.  What is defence in

By |2021-02-02T22:29:04-05:00December 3rd, 2020|Security Analysis, Threat Hunting|

What is SASE?

Secure access, secure edge (SASE) is the hot ticket cybersecurity. Do you understand the benefits? Introducing: SASE Whenever sales of security products dip, vendors leverage buzzwords in an effort to explain business problems. They push the buzzword hard for a short while, just long enough for people to buy it and figure out the claims

By |2020-12-03T16:42:45-05:00November 12th, 2020|Security Analysis, Threat Hunting|

Cybersecurity Countermeasures: Barriers to Risk Management

A discussion of The Law of Diminishing Returns and Cybersecurity Investment. The Cybersecurity Price Quandary A reasonably good anti-virus product with a bundled firewall can be acquired for less than a dollar per month. Some companies pay double that for an advanced endpoint detection product or a managed detection service. Larger companies frequently spend thousands

By |2020-12-03T16:39:21-05:00October 29th, 2020|Security Analysis, Threat Hunting|

Combatting Cyber Alert Fatigue

The more endpoint breach alerts that sound, the less responsive a cybersecurity team becomes. The likelihood of an endpoint breach increases. Distinguishing Important Alerts from Noise Everyone experiences alert fatigue. Alert fatigue is such a common problem that it dates as far back as Aesop’s Fable from the 6th century BC: There once was a shepherd

By |2020-12-07T15:47:38-05:00October 15th, 2020|Security Analysis, Threat Hunting|
Go to Top