- 221
- 582 967
Red Canary
United States
เข้าร่วมเมื่อ 3 มิ.ย. 2015
Red Canary stops cyber threats no one else does, so organizations can fearlessly pursue their missions. Security leaders all share one goal: Don’t get breached.
Since day one at Red Canary, enterprises have relied on us to find and stop threats before they can cause harm. The most sophisticated security teams trust us for our intelligence-led security operations platform run by world-class security experts. We manage, detect and respond to prevalent threats across cloud, identity, and endpoint so you can have more time to focus on business-specific security needs and requirements. We got you.
Here on TH-cam we'll be publishing content about Atomic Red Team, threat intelligence, threat hunting, security operations, Managed Detection and Response (MDR), the MITRE ATT&CK framework, and more.
Since day one at Red Canary, enterprises have relied on us to find and stop threats before they can cause harm. The most sophisticated security teams trust us for our intelligence-led security operations platform run by world-class security experts. We manage, detect and respond to prevalent threats across cloud, identity, and endpoint so you can have more time to focus on business-specific security needs and requirements. We got you.
Here on TH-cam we'll be publishing content about Atomic Red Team, threat intelligence, threat hunting, security operations, Managed Detection and Response (MDR), the MITRE ATT&CK framework, and more.
Ransomware operators leveraging VPNs | Red Canary Threat Intelligence
Senior Intelligence Analyst Stef Rand discusses some key highlights from the September 2024 Red Canary Intelligence Insights.
Browser-related trickery dominates 0:00
LummaC2 Stealer surges 0:28
Ransomware operators using VPNs 1:08
For a full breakdown of this month’s insights, check out the blog: redcanary.com/blog/threat-intelligence/intelligence-insights-september-2024/
To stay up-to-date on top threats and research from Red Canary, subscribe to our weekly newsletter: redcanary.com/blog/#subscribe
Follow Stef:
techieStef
www.linkedin.com/in/stephanie-rand/
Follow us:
RedCanary
www.linkedin.com/company/redcanary
---
Red Canary stops cyber threats no one else does, so organizations can fearlessly pursue their missions. We do it by delivering managed detection and response (MDR) across enterprise endpoints, cloud workloads, network, identities, and SaaS apps. As a security ally, we define MDR in our own terms with unlimited 24×7 support, deep threat expertise, hands-on remediation, and by doing what’s right for customers and partners.
Subscribe to our TH-cam channel for frequently updated, how-to content about Atomic Red Team, threat hunting in security operations, MDR or Managed Detection and Response, and using the MITRE ATT&CK® framework.
#ransomware #malware #VPN #cybersecurity #threatintelligence
Browser-related trickery dominates 0:00
LummaC2 Stealer surges 0:28
Ransomware operators using VPNs 1:08
For a full breakdown of this month’s insights, check out the blog: redcanary.com/blog/threat-intelligence/intelligence-insights-september-2024/
To stay up-to-date on top threats and research from Red Canary, subscribe to our weekly newsletter: redcanary.com/blog/#subscribe
Follow Stef:
techieStef
www.linkedin.com/in/stephanie-rand/
Follow us:
RedCanary
www.linkedin.com/company/redcanary
---
Red Canary stops cyber threats no one else does, so organizations can fearlessly pursue their missions. We do it by delivering managed detection and response (MDR) across enterprise endpoints, cloud workloads, network, identities, and SaaS apps. As a security ally, we define MDR in our own terms with unlimited 24×7 support, deep threat expertise, hands-on remediation, and by doing what’s right for customers and partners.
Subscribe to our TH-cam channel for frequently updated, how-to content about Atomic Red Team, threat hunting in security operations, MDR or Managed Detection and Response, and using the MITRE ATT&CK® framework.
#ransomware #malware #VPN #cybersecurity #threatintelligence
มุมมอง: 106
วีดีโอ
The identity crisis: Why your network is more vulnerable than ever
มุมมอง 14616 ชั่วโมงที่ผ่านมา
Identities are the new perimeter of enterprise networks. With users and devices connecting from everywhere, challenges of understanding modern architecture and implementing security measures like multifactor authentication (MFA), it's clear that protecting user identities isn't easy. In this video, Senior Malware Analyst Tony Lambert and Principal Security Specialist Brian Donohue break down wh...
5 new insights from Red Canary Intelligence
มุมมอง 31714 วันที่ผ่านมา
Join Alex Berninger, Senior Manager of Intelligence, as she unpacks some fresh takes from Red Canary Intelligence. In this video, Alex challenges common assumptions and offers valuable insights from the 2024 Threat Detection Report. Intro 0:00 Industry doesn’t define risk 0:12 Attribution isn’t always necessary 2:57 Malware isn’t the main threat 5:46 Nuance is important 7:09 IT is an attack vec...
What is lateral movement?
มุมมอง 18421 วันที่ผ่านมา
Principal Security Specialists Phil Hagen and Brian Donohue break down some of the techniques attackers use to traverse networks and cloud environments, exploiting native tools and protocols to expand their reach. Learn how adversaries move from foothold to full compromise and discover key strategies to protect your organization from this stealthy maneuvering. Intro 0:00 What is lateral movemen...
Emulating ransomware threats using Atomic Red Team
มุมมอง 30821 วันที่ผ่านมา
Principal Security Solutions Specialist Gerry Johansen as he guides you through the powerful world of threat emulation using Atomic Red Team. In this in-depth session, you'll learn how to incorporate cyber threat intelligence with Atomic Red Team to validate your detection and response capabilities against real-world ransomware threats. Intro 0:00 Why emulate? 3:05 Atomic Red Team 101 8:00 Emul...
The Detection Series: Crypters and loaders
มุมมอง 29821 วันที่ผ่านมา
In this video, we’re taking a deep dive into the world of malware loaders, crypters, and obfuscation techniques that attackers are using on Windows, macOS, and Linux. Join Senior Malware Analyst Tony Lambert, along with Alex DeLamotte from SentinelOne and MITRE's Joe Slowik, as they break down how attackers are stepping up their game to dodge detection. They’ll explore how adversaries are using...
Browser-related malware on the rise | Red Canary Threat Intelligence
มุมมอง 183หลายเดือนก่อน
Senior Intelligence Analyst Stef Rand discusses some key highlights from the August 2024 Red Canary Intelligence Insights. ChromeLoader maintains top spot 0:00 More browser-related malware 0:28 For a full breakdown of this month’s insights, check out the blog: redcanary.com/blog/threat-intelligence/intelligence-insights-august-2024/ To stay up-to-date on top threats and research from Red Canary...
The dark side of APIs: Uncovering threats to your cloud security
มุมมอง 207หลายเดือนก่อน
APIs are the backbone of cloud services, enabling seamless integration and communication between different platforms and applications. But did you know that they can also be a prime target for cybercriminals? In this video, Chief Security Officer Keith McCammon and Principal Information Security Specialist Phil Hagen dive into the world of API abuse in the cloud, exploring how adversaries explo...
Is your security 'Kenough'? Mastering detection & prevention
มุมมอง 297หลายเดือนก่อน
Feeling overwhelmed by false positive alerts? Your security might not be 'Kenough'! In this Barbie-themed session, Detection Engineer Mak Foss and Senior Detection Engineer Rachel Schwalk dive into behavioral detection strategies for various threats, helping you refine your processes to detect malicious activities more effectively. You'll also learn about prevention measures and how to test you...
The JavaScript threats you need to know about…
มุมมอง 449หลายเดือนก่อน
Learn how attackers are leveraging JavaScript to compromise systems. Principal Intelligence Analyst Jeff Felling dives into the mechanics of the exploit, how it bypasses traditional defenses, and how you can leverage a text editor and a simple Group Policy Object (GPO) to protect yourself and your organization. Intro 0:00 Threats using JavaScript lure 0:31 Mechanics of the attack 2:16 Preventin...
Amber Albatross arrives with stealer capabilities | Red Canary Threat Intelligence
มุมมอง 1872 หลายเดือนก่อน
Senior Intelligence Analyst Stef Rand spotlights some main takeaways from the July 2024 Red Canary Intelligence Insights. ChromeLoader at #1 0:00 Amber Albatross appears 0:41 dllFake makes the list 1:22 For a full breakdown of this month’s insights, check out the blog: redcanary.com/blog/threat-intelligence/intelligence-insights-july-2024/ To stay up-to-date on top threats and research from Red...
How to bridge the gap between cloud development & security | Red Canary
มุมมอง 1792 หลายเดือนก่อน
On the heels of their discussion on the CyberWire-X podcast, Principal Software Engineer and cloud builder Brian Davis and Senior Detection Engineer Thomas Gardner explore the dynamic between cloud development and security. The pair tackle the real-world issue of developers and cloud architects performing actions at speed that resemble adversarial behavior. Learn how detection engineers interpr...
How we stopped a hospital ransomware attack
มุมมอง 7212 หลายเดือนก่อน
How we stopped a hospital ransomware attack
Cloud security: How to decide if you should do things in-house or outsource | Red Canary
มุมมอง 2052 หลายเดือนก่อน
Cloud security: How to decide if you should do things in-house or outsource | Red Canary
The difference between Scarlet Goldfinch & SocGholish | Red Canary Threat Intelligence
มุมมอง 3903 หลายเดือนก่อน
The difference between Scarlet Goldfinch & SocGholish | Red Canary Threat Intelligence
Stay vigilant against ransomware precursors | Red Canary Threat Intelligence
มุมมอง 2463 หลายเดือนก่อน
Stay vigilant against ransomware precursors | Red Canary Threat Intelligence
3 things to consider when buying EDR | Red Canary
มุมมอง 4793 หลายเดือนก่อน
3 things to consider when buying EDR | Red Canary
Top threats leveraging NetSupport Manager | Red Canary Threat Intelligence
มุมมอง 1084 หลายเดือนก่อน
Top threats leveraging NetSupport Manager | Red Canary Threat Intelligence
Optimize your SOC with product management & intelligence-led strategies | Red Canary
มุมมอง 3154 หลายเดือนก่อน
Optimize your SOC with product management & intelligence-led strategies | Red Canary
Detecting and responding to stealer malware in 2024 | Red Canary
มุมมอง 8144 หลายเดือนก่อน
Detecting and responding to stealer malware in 2024 | Red Canary
The Detection Series: Windows Management Instrumentation (Part 2) | Red Canary
มุมมอง 3414 หลายเดือนก่อน
The Detection Series: Windows Management Instrumentation (Part 2) | Red Canary
The Detection Series: Windows Management Instrumentation (Part 1) | Red Canary
มุมมอง 4494 หลายเดือนก่อน
The Detection Series: Windows Management Instrumentation (Part 1) | Red Canary
The Detection Series: Installer packages | Red Canary
มุมมอง 4204 หลายเดือนก่อน
The Detection Series: Installer packages | Red Canary
How adversaries use SEO poisoning to serve up malware | Red Canary
มุมมอง 3125 หลายเดือนก่อน
How adversaries use SEO poisoning to serve up malware | Red Canary
Establishing an effective response capability | Red Canary
มุมมอง 1745 หลายเดือนก่อน
Establishing an effective response capability | Red Canary
SocGholish malware dominates April threat landscape | Red Canary Threat Intelligence
มุมมอง 2535 หลายเดือนก่อน
SocGholish malware dominates April threat landscape | Red Canary Threat Intelligence
Overcoming cloud security challenges | Red Canary
มุมมอง 1995 หลายเดือนก่อน
Overcoming cloud security challenges | Red Canary
Identify and address multicloud challenges | Red Canary
มุมมอง 315 หลายเดือนก่อน
Identify and address multicloud challenges | Red Canary
Strategies for AWS cloud challenges | Red Canary
มุมมอง 785 หลายเดือนก่อน
Strategies for AWS cloud challenges | Red Canary
Bringing GenAI into your Security Operations | Red Canary
มุมมอง 2645 หลายเดือนก่อน
Bringing GenAI into your Security Operations | Red Canary
Woo!! Go, Stefi! 🥳
Love the video! I wish you wouldn’t limit this diction/nomenclature to just cloud. All modern software and OSes run off APIs as a way to operate. I feel like it would be more impactful if you just renamed “cloud” to modern software.
This is really cool!
GOOD INFO PER USUAL
this whole webinar is very valueable
great content like really good forbidden knowledge, crazy to me that only 1.5k people have viewed this important resource in 3 years 🎗
We're glad you find it helpful!
@@RedCanary Always when you guys :) i have a big interest in redcaranry,sansdfir,fireye,rapid7 etc etc
my second fav is lateral movement 🤭🤗😏
This is my favorite webinar yet 😈
also wanted to state that yea by default the sys would be UEFI secure boot or csm wit tpm. Thing is if they want that firmware rootkit they could tamper with the bios via a kernel rootkit changed to legacy etc then run whatver they want under under the hood !!
nice, apple talk and apple share are W's
iphonecloudsync as well
the title make me laugh and smile
best demo for kerberoasting i have ever seen
Music to our ears. Thank you!
very well put. As a person looking to generate IOCs this is great and clear. also teaches the red team perspective real well / attacker
We're glad you found value in it!
Thank you for posting these videos.. they’re a big help 🤙🏼
We're happy to help!
Good session, thanks.
Stef Rand is so cool! She could host her own podcast. She has a wealth of knowledge. Tony is brilliant. He's also so cool, calm and collected in front of the camera. They should make this a regular interview series on a wide variety of security topics. Red Canary ROCKS!!
looking forward to seeing much content like this
Are you implicitly stating that the Ransomware attacks were less because the detection capability of Red Canary has improved and as a result we are detecting such malicious activity much early in the attack life cycle.
How many man-days are required to analyze 58,000 threats?
Absoultely perfect job. Please keep going with Defender series
Brilliant!
Promo'SM
yea, I feel like this could have been a 10 minute video 😅
That is helpful feedback, thank you. We'll see what we can do about making our TH-cam edits of our webinars a bit more concise.
👀🎯
Bullseye?
well done, as always. Thanks 4 your great work and cheers to RedCanary
Thank you! Cheers!
amazing content
Thank you!
are these all tecniques already blocked by antivurus as per now?
Good question, there are various levels of protection against these techniques since the publication of this video.
Thought this might be somebody vs Matt and Shane’s secret podcast but I guess not 👎🏻
A secret podcast does sound very fun. Let us know if you're planning one...or don't?
This is very cool. Thank you
Thanks for watching and commenting!
a one hour video to tell you to check application logs and standard registry keys lol fascinating
Appreciate the feedback. We'll look at ways we can make our TH-cam version of webinars more concise.
red canary isnt what it use to be, this is so generic
hater
This was so fetch!!!
Very grool of you to say that @jessicawilliams949
LOL this starter
this title is everything !! :D
This was fun. Favorite quote: " most of the time they're helpful...."
Thanks for watching! We're going to have to do more of these!
'promosm'
Can u go on detail and explain the PE part on windows ?
We've suggested this to our community team as a future video topic. Thanks for the suggestion!
Powershell was the #2 threat in our 2023 Threat Detection Report. Poke around the entire report now: redcanary.com/resources/guides/threat-detection-report/?
So Smartly! Geniuses.
The threat timeline is neat...
Thank you! We've heard over and over again that it is a helpful feature in providing proper context in a quick and meaningful fashion.
This is such a great idea.
Thank you! If you're looking for some more information on Readiness Exercises check this out: redcanary.com/cybersecurity-readiness/?
Looks like this might have hit the news again?
Hot hot hot. Get to know the secret = "promo sm" .
Very interesting and great summary. Outstanding approach!
Glad it was helpful!
Very good explanations, thank you!
Glad it was helpful!
please actually make A Nightmare on MFA Street
Don't tempt us with a good time. Having said that, we're using this comment to argue that there is insane public demand to make it.
🎶 ρɾσɱσʂɱ
Nice, people should be scared before clicking phising links 😂