Widespread Phishing and Business Email Compromise Campaign
In this blog post we cover a widespread phishing campaign Recon recently observed targeting...
In this blog post we cover a widespread phishing campaign Recon recently observed targeting...
This guide will walk you through using CanaryTokens.org to generate a token and how to use that...
The recent Log4j vulnerability (CVE-2021-44228) is unprecedented in its global scope and impact....
In July, Eric & Whitney gave a talk titled "Breaches Be Crazy" at the SANS DFIR Summit outlining...
It’s that time of year again - DEF CON! We were thrilled to run OpenSOC again at DEF CON this year,...
Recon's SOC recently responded to an attempted ransomware and extortion attack. It had all the...
The Recon incident response team recently responded to a case of business email compromise. The...
Whether your cybersecurity detection and response capabilities are in-house or managed through a...
We can't start a recap post without a huge THANK YOU to the community for joining us last week and...
Now that we've normalized and enriched our events, let's get into the actual threat detection logic...