Sebastian KandlerinDetect FYIBreach and Attack Simulations – Product ComparisonBreach and Attack Simulation (BAS) tools are a valuable addition to an organization’s cybersecurity strategy. They provide continuous…2d ago2d ago
Sebastian KandlerinDetect FYIEDR — Your weakest link in protecting against a Ransomware Attack?We can see tampered EDR solutions in nearly all ransomware and APT attacks (MITRE ID: T1562.001). It’s one of the first steps attackers…5d ago5d ago
Sebastian KandlerinDetect FYIMaximize Your IPS Potential: Enhancing Security with Automated BlockingTypically, an Intrusion Prevention System (IPS) only blocks the specific TCP connection that triggered an alert. However, considering the…Jul 6Jul 6
Sebastian KandlerinDetect FYISimulating an Akira Ransomware Attack with Atomic Red TeamWe all know about the risks of Ransomware Attacks, we did our homework and prepared a lot of expensive security tools, set up an SOC…Jul 31Jul 31