Advanced Email Protection to be Thrilled About
If you use a computer for work, you use email, it’s a standard in every industry today. Email is...
If you use a computer for work, you use email, it’s a standard in every industry today. Email is...
In our experience working with SMB and enterprise IT teams, it is often unknown just how far and...
Do you have resources on prem? In the cloud? How about in multiple clouds? How do you access them...
In this blog post we cover a widespread phishing campaign Recon recently observed targeting...
This guide will walk you through using CanaryTokens.org to generate a token and how to use that...
The recent Log4j vulnerability (CVE-2021-44228) is unprecedented in its global scope and impact....
In July, Eric & Whitney gave a talk titled "Breaches Be Crazy" at the SANS DFIR Summit outlining...
The Recon incident response team recently responded to a case of business email compromise. The...
Now that we've normalized and enriched our events, let's get into the actual threat detection logic...
In my previous post, I explained the fundamental purpose and use cases of pipelines in Graylog –...