Detecting Fake CAPTCHA Campaigns: ClickFix, ClearFake, and Etherhide
Our team recently observed a significant uptick in malware campaigns leveraging fake CAPTCHA pages...
Effective Threat Hunting
This post was written by Luke Rusten, our Director of Security Operations, and was originally...
Recon InfoSec Offers Free Cybersecurity Threat Hunting Service for Critical Infrastructure Entities
With the ongoing conflict in Ukraine and U.S. sanctions against Russia continuing to build, the...
OPENSOC @ DEF CON 29
It’s that time of year again - DEF CON! We were thrilled to run OpenSOC again at DEF CON this year,...
Threat Hunting - A Critical Component of High Performing SOCs
Whether your cybersecurity detection and response capabilities are in-house or managed through a...
Detecting Threats with Graylog Pipelines - Part 3
Now that we've normalized and enriched our events, let's get into the actual threat detection logic...
Recon Launches SOC X
The Recon team is excited to announce the launch of SOC X™, the Professional SOC Team World...
Recon Launches Network Defense Range (NDR) Live Online
The Recon team is thrilled to announce our newest offering, NDR Live Online!
Securing Your Velociraptor Deployment
Our team are huge fans of Velociraptor. It's an incredibly powerful tool, for both DFIR and...