ActiveCanopy
  • Product
  • Services
  • Cyber Hunter Blog
  • Clients
  • Contact

Cyber Hunter Blog

Tags

  • Business Impact Analysis
  • Cyber Analytics
  • Cyber Hunting Blog
  • Cyber Market
  • Cyber Orchestration
  • Deep/Dark Web
  • Endpoint Monitoring
  • Incident Response
  • metrics
  • open source intelligence
  • Risk Management
  • social engineering
  • vishing

Authors

  • Chris Koentopp (3)
  • Cyber Hunter (5)
  • Mark Dominguez (3)
  • Mark Dominguez (2)
    • 09/09/2020
    • Chris Koentopp

    Measuring Cyber Security Success

    The call for measuring cyber security success - the ability to provide information metrics about the posture of the network, which can be used to assess the level of threats, and to decide when to heighten security postures due to perceived risks. Often this can be a misunderstood philosophy based on paradigms of typical l...Read more Arrow

    • metrics
    • 08/26/2020
    • Mark Dominguez

    Vishing – a Growing Tradecraft

    Recent reporting has shown an increase in social engineering campaigns for Vishing “voice phishing.” These attacks manipulate computer users into giving out confidential user information via a phone call. In most cases, the attackers use stolen credentials to mine the victim company databases for their customers’ per...Read more Arrow

    • open source intelligence
    • social engineering
    • vishing
    • 08/19/2020
    • Mark Dominguez

    Managing Cyber Risk

    All businesses are reliant on digital resources for operations. However, using those resources can add unknown risks to business operations. Cyber risk management is about managing the effects of uncertainty on business operations by reviewing current security processes and technologies. Any successful organization will co...Read more Arrow

    • Business Impact Analysis
    • Risk Management
    • 07/31/2017
    • Cyber Hunter

    Banking Keylogger leverages EmpireShell Framework

    Introduction In the beginning of July 2017, ActiveCanopy Cyber Operations Center was called to support an incident response for a healthcare network system. During the incident response, a malicious file was identified on a compromised host on the network system. After some investigative research, it was determined the ...Read more Arrow

    • Cyber Hunting Blog
    • Incident Response
    • 06/02/2017
    • Cyber Hunter

    Hackers Favorite Phishing Spot

    The growth of phishing attacks in both frequency and sophistication continue to be a high threat with tradecraft showcasing deceptive, spear, and fraudulent techniques in one campaign. These cyber criminals have adapted to recognize user behavior luring those in organizations that must conduct specific services in their dai...Read more Arrow

    • Deep/Dark Web
    • Incident Response
  • Arrow
  • NextArrow
Website Logo
  • Product
  • Services
  • Cyber Hunter Blog
  • Clients
  • Contact
  • Icon

© 2019 ActiveCanopy. All rights reserved. Website designed by MAVENTRI.